Sciweavers

1748 search results - page 157 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
FASE
2009
Springer
15 years 7 months ago
Certification of Smart-Card Applications in Common Criteria
This paper describes the certification of smart-card applications in the framework of Common Criteria. In this framework, a smart-card application is represented by a model of its...
Iman Narasamdya, Michaël Périn
USENIX
2001
15 years 4 months ago
Integrating Flexible Support for Security Policies into the Linux Operating System
The protection mechanisms of current mainstream operating systems are inadequate to support confidentiality and integrity requirements for end systems. Mandatory access control (M...
Peter Loscocco, Stephen Smalley
HICSS
2007
IEEE
120views Biometrics» more  HICSS 2007»
15 years 9 months ago
Web Mash-ups and Patchwork Prototyping: User-driven technological innovation with Web 2.0 and Open Source Software
The recent emergence of web mash-ups and open source software is driving the development of new practices in software and systems development. In this paper we explore novel pract...
Ingbert R. Floyd, M. Cameron Jones, Dinesh Rathi, ...
CSFW
2006
IEEE
15 years 9 months ago
Encoding Information Flow in Haskell
This paper presents an embedded security sublanguage for enforcing information-flow policies in the standard Haskell programming language. The sublanguage provides useful informa...
Peng Li, Steve Zdancewic
CONSTRAINTS
2008
182views more  CONSTRAINTS 2008»
15 years 3 months ago
Constraint Programming in Structural Bioinformatics
Bioinformatics aims at applying computer science methods to the wealth of data collected in a variety of experiments in life sciences (e.g. cell and molecular biology, biochemistry...
Pedro Barahona, Ludwig Krippahl