Sciweavers

276 search results - page 23 / 56
» Security in Context: Analysis and Refinement of Software Arc...
Sort
View
ACSAC
2006
IEEE
15 years 7 months ago
Engineering Sufficiently Secure Computing
We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal v...
Brian Witten
OOPSLA
2007
Springer
15 years 7 months ago
Probabilistic calling context
Calling context enhances program understanding and dynamic analyses by providing a rich representation of program location. Compared to imperative programs, objectoriented program...
Michael D. Bond, Kathryn S. McKinley
FM
2008
Springer
130views Formal Methods» more  FM 2008»
15 years 3 months ago
Specification and Checking of Software Contracts for Conditional Information Flow
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
Torben Amtoft, John Hatcliff, Edwin Rodrígu...
SIGPLAN
1998
15 years 1 months ago
Java and Distributed Object Models: An Analysis
Java has an important role in building distributed object oriented web enabled applications. In the article an analysis of two distributed object models in context of Java languag...
Marjan Hericko, Matjaz B. Juric, Ales Zivkovic, Iv...
JAR
2006
99views more  JAR 2006»
15 years 1 months ago
An Integrated Approach to High Integrity Software Verification
Using automated reasoning techniques, we tackle the niche activity of proving that a program is free from run-time exceptions. Such a property is particularly valuable in high inte...
Andrew Ireland, Bill J. Ellis, Andrew Cook, Roderi...