Sciweavers

69 search results - page 8 / 14
» The COPS Security Checker System
Sort
View
CODES
2005
IEEE
15 years 3 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
72
Voted
PLDI
2006
ACM
15 years 3 months ago
Combining type-based analysis and model checking for finding counterexamples against non-interference
Type systems for secure information flow are useful for efficiently checking that programs have secure information flow. They are, however, conservative, so that they often rej...
Hiroshi Unno, Naoki Kobayashi, Akinori Yonezawa
65
Voted
DISCEX
2003
IEEE
15 years 2 months ago
The STRONGMAN Architecture
The design principle of restricting local autonomy only where necessary for global robustness has led to a scalable Internet. Unfortunately, this scalability and capacity for dist...
Angelos D. Keromytis, Sotiris Ioannidis, Michael B...
81
Voted
SIGSOFT
2003
ACM
15 years 10 months ago
Tracking pointers with path and context sensitivity for bug detection in C programs
This paper proposes a pointer alias analysis for automatic error detection. State-of-the-art pointer alias analyses are either too slow or too imprecise for finding errors in real...
V. Benjamin Livshits, Monica S. Lam
83
Voted
FC
1998
Springer
96views Cryptology» more  FC 1998»
15 years 1 months ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss