Sciweavers

2213 search results - page 406 / 443
» Software Security
Sort
View
OOPSLA
2009
Springer
15 years 6 months ago
Debug all your code: portable mixed-environment debugging
Programmers build large-scale systems with multiple languages to reuse legacy code and leverage languages best suited to their problems. For instance, the same program may use Jav...
Byeongcheol Lee, Martin Hirzel, Robert Grimm, Kath...
OOPSLA
2009
Springer
15 years 6 months ago
Reimagining literate programming
In this paper we describe Ginger, a new language with first class support for literate programming. Literate programming refers to a philosophy that argues computer programs shou...
James Dean Palmer, Eddie Hillenbrand
SIGCOMM
2009
ACM
15 years 6 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
15 years 6 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
CCS
2007
ACM
15 years 6 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder