Sciweavers

946 search results - page 73 / 190
» Software engineering for security: a roadmap
Sort
View
PLDI
2012
ACM
13 years 8 days ago
RockSalt: better, faster, stronger SFI for the x86
Software-based fault isolation (SFI), as used in Google’s Native Client (NaCl), relies upon a conceptually simple machine-code analysis to enforce a security policy. But for com...
Greg Morrisett, Gang Tan, Joseph Tassarotti, Jean-...
CSSE
2008
IEEE
15 years 4 months ago
A Markov Game Theory-Based Risk Assessment Model for Network Information System
—Risk assessment is a very important tool to acquire a present and future security status of the network information system. Many risk assessment approaches consider the present ...
Cui Xiaolin, Xiaobin Tan, Zhang Yong, Hongsheng Xi
FSTTCS
2007
Springer
15 years 4 months ago
Safely Composing Security Protocols
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However ...
Véronique Cortier, Jérémie De...
OOPSLA
1993
Springer
15 years 1 months ago
How to Get a Paper Accepted at OOPSLA (Panel)
iam Pugh. Advice to authors of extended abstracts. http://www.acm.org/sigplan/conferences/author-info/pughadvice.html. [7] Mary Shaw. Writing good software engineering research pap...
Ralph E. Johnson, Kent Beck, Grady Booch, William ...
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
15 years 3 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...