Sciweavers

5843 search results - page 218 / 1169
» Software Security in Practice
Sort
View
151
Voted
ICFEM
2009
Springer
15 years 11 months ago
Combining Static Model Checking with Dynamic Enforcement Using the Statecall Policy Language
Internet protocols encapsulate a significant amount of state, making implementing the host software complex. In this paper, we define the Statecall Policy Language (SPL) which pr...
Anil Madhavapeddy
OOPSLA
2005
Springer
15 years 10 months ago
Micro patterns in Java code
Micro patterns are similar to design patterns, except that micro patterns stand at a lower, closer to the implementation, level of abstraction. Micro patterns are also unique in t...
Joseph Gil, Itay Maman
210
Voted
DRMTICS
2005
Springer
15 years 10 months ago
Algorithms to Watermark Software Through Register Allocation
Software security is a significant issue in the Internet age. In order to prevent software from piracy and unauthorized modification, many techniques have been developed. Softwar...
William Zhu, Clark D. Thomborson
SP
2002
IEEE
122views Security Privacy» more  SP 2002»
15 years 4 months ago
The UNICORE Grid infrastructure
UNICORE (Uniform Interface to Computer Resources) is a software infrastructure supporting seamless and secure access to distributed resources. UNICORE allows uniform access to dif...
Mathilde Romberg
153
Voted
ACSAC
1999
IEEE
15 years 9 months ago
Trustworthy Access Control with Untrustworthy Web Servers
If sensitive information is to be included in a shared web, access controls will be required. However, the complex software needed to provide a web service is prone to failure. To...
Tim Wilkinson, Dave Hearn, Simon R. Wiseman