Sciweavers

3003 search results - page 194 / 601
» Software Security: Building Security In
Sort
View
VMCAI
2010
Springer
16 years 1 months ago
Automatic Abstraction for Congruences
c Abstraction for Congruences A Story of Beauty and the Beast Andy King and Harald S?ndergaard Portcullis Computer Security University of Melbourne g and Harald S?ndergaard Automat...
Andy King, Harald Søndergaard
WCRE
2005
IEEE
15 years 10 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
OOPSLA
2009
Springer
15 years 9 months ago
The operation recorder: specifying model refactorings by-example
Predefined composite operations are handy for efficient software modeling, e.g., for the automatic execution of refactor
Petra Brosch, Martina Seidl, Konrad Wieland, Manue...
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
16 years 4 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
15 years 11 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...