Sciweavers

423 search results - page 70 / 85
» A Logical Approach to Dynamic Role-Based Access Control
Sort
View
SIGMETRICS
2008
ACM
214views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
HMTT: a platform independent full-system memory trace monitoring system
Memory trace analysis is an important technology for architecture research, system software (i.e., OS, compiler) optimization, and application performance improvements. Many appro...
Yungang Bao, Mingyu Chen, Yuan Ruan, Li Liu, Jianp...
CCS
2011
ACM
12 years 8 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
CODES
2005
IEEE
13 years 10 months ago
FIDES: an advanced chip multiprocessor platform for secure next generation mobile terminals
We propose a secure platform on a chip multiprocessor, known as FIDES, in order to enable next generation mobile terminals to execute downloaded native applications for Linux. Its...
Hiroaki Inoue, Akihisa Ikeno, Masaki Kondo, Junji ...
ACSC
2007
IEEE
14 years 3 months ago
Web Services Discovery Based On Schema Matching
A web service is programmatically available application logic exposed over Internet. With the rapid development of e-commerce over Internet, web services have attracted much atten...
Yanan Hao, Yanchun Zhang
FM
2003
Springer
108views Formal Methods» more  FM 2003»
14 years 2 months ago
Correctness of Source-Level Safety Policies
Abstract. Program certification techniques formally show that programs satisfy certain safety policies. They rely on the correctness of the safety policy which has to be establish...
Ewen Denney, Bernd Fischer 0002