Sciweavers

2429 search results - page 314 / 486
» Using Aspects to Design a Secure System
Sort
View
100
Voted
MIDDLEWARE
2004
Springer
15 years 7 months ago
PoliPer: policies for mobile and pervasive environments
The need for sharing is well known in a large number of distributed applications. These applications are difficult to develop either for fully wired or mobile wireless networks. ...
Luís Veiga, Paulo Ferreira
119
Voted
CORR
2002
Springer
101views Education» more  CORR 2002»
15 years 1 months ago
Semantic Component Composition
Building complex software systems necessitates the use of component-based architectures. In theory, of the set of components needed for a design, only some small portion of them ar...
Joseph Kiniry
DSN
2007
IEEE
15 years 8 months ago
Automatic Cookie Usage Setting with CookiePicker
HTTP cookies have been widely used for maintaining session states, personalizing, authenticating, and tracking user behaviors. Despite their importance and usefulness, cookies hav...
Chuan Yue, Mengjun Xie, Haining Wang
CCS
2007
ACM
15 years 8 months ago
On the infeasibility of modeling polymorphic shellcode
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
CSFW
2011
IEEE
14 years 1 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...