Sciweavers

69 search results - page 4 / 14
» Towards Semantics for Provenance Security
Sort
View
98
Voted
EUROPKI
2007
Springer
15 years 8 months ago
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code
In this paper we propose the notion of security-by-contract, a mobile contract that an application carries with itself. The key idea of the framework is that a digital signature sh...
Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka...
CCS
2008
ACM
15 years 3 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
135
Voted
CCS
2008
ACM
15 years 3 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
111
Voted
PST
2008
15 years 3 months ago
Cross-Language Weaving Approach Targeting Software Security Hardening
In this paper, we propose an approach for systematic security hardening of software based on aspect-oriented programming and Gimple language. We also present the first steps towar...
Azzam Mourad, Dima Alhadidi, Mourad Debbabi
105
Voted
PATAT
2004
Springer
138views Education» more  PATAT 2004»
15 years 7 months ago
Semantic Components for Timetabling
Abstract. Automated timetabling is a research domain that has occupied many researchers over the last 50 years. Several algorithms have proven to be applicable to timetabling but t...
Nele Custers, Patrick De Causmaecker, Peter Demees...