Sciweavers

5722 search results - page 200 / 1145
» Security Function Interactions
Sort
View
CANDC
2002
ACM
15 years 19 days ago
A Tool for the Interactive 3D Visualization of Electronic Structure in Molecules and Solids
This paper presents the Vienna ab initio simulation package (VASP) data viewer, a desktop 3D visualization application for the analysis of valence electronic structure information...
Timothy B. Terriberry, David F. Cox, Doug A. Bowma...
127
Voted
APLAS
2010
ACM
15 years 1 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
ICALP
2004
Springer
15 years 6 months ago
Deciding Knowledge in Security Protocols Under Equational Theories
The analysis of security protocols requires precise formulations of the knowledge of protocol participants and attackers. In formal approaches, this knowledge is often treated in t...
Martín Abadi, Véronique Cortier
205
Voted
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
16 years 1 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
92
Voted
CCS
2009
ACM
16 years 1 months ago
Intrusion response cost assessment methodology
In this paper we present a structured methodology for evaluating cost of responses based on three factors: the response operational cost associated with the daily maintenance of t...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...