Sciweavers

14824 search results - page 2504 / 2965
» Security - Introduction
Sort
View
RAID
2009
Springer
15 years 11 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
RTA
2009
Springer
15 years 11 months ago
YAPA: A Generic Tool for Computing Intruder Knowledge
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages...
Mathieu Baudet, Véronique Cortier, St&eacut...
TLCA
2009
Springer
15 years 11 months ago
Lexicographic Path Induction
Abstract. Programming languages theory is full of problems that reduce to proving the consistency of a logic, such as the normalization of typed lambda-calculi, the decidability of...
Jeffrey Sarnat, Carsten Schürmann
137
Voted
APLAS
2009
ACM
15 years 11 months ago
Ownership Downgrading for Ownership Types
Ownership types support information hiding by providing object-based encapsulation. However the static restrictions they impose on object accessibility can limit the expressiveness...
Yi Lu 0003, John Potter, Jingling Xue
DEBS
2009
ACM
15 years 11 months ago
PrivateFlow: decentralised information flow control in event based middleware
Complex middleware frameworks are made out of interacting components which may include bugs. These frameworks are often extended to provide additional features by thirdparty exten...
Ioannis Papagiannis, Matteo Migliavacca, Peter R. ...
« Prev « First page 2504 / 2965 Last » Next »