Sciweavers

526 search results - page 55 / 106
» Towards the Verifying Compiler
Sort
View
ESOP
2010
Springer
15 years 7 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh
IAT
2006
IEEE
15 years 3 months ago
A Cognitive Model for Visual Attention and Its Application
In this paper a cognitive model for visual attention is introduced. The cognitive model is part of the design of a software agent that supports a naval warfare officer in its task...
Tibor Bosse, Peter-Paul van Maanen, Jan Treur
SP
2005
IEEE
183views Security Privacy» more  SP 2005»
15 years 3 months ago
A Generic Attack on Checksumming-Based Software Tamper Resistance
Self-checking software tamper resistance mechanisms employing checksums, including advanced systems as recently proposed by Chang and Atallah (2002) and Horne et al. (2002), have ...
Glenn Wurster, Paul C. van Oorschot, Anil Somayaji
VSTTE
2005
Springer
15 years 3 months ago
Reasoning about Object Structures Using Ownership
Abstract. Many well-established concepts of object-oriented programming work for individual objects, but do not support object structures. The development of a verifying compiler r...
Peter Müller
FASE
2001
Springer
15 years 2 months ago
A Logic for the Java Modeling Language JML
Abstract. This paper describes a specialised logic for proving specifications in the Java Modeling Language (JML). JML is an interface specification language for Java. It allows ...
Bart Jacobs, Erik Poll