Sciweavers

1663 search results - page 82 / 333
» Computer Security in the Real World
Sort
View
IJISEC
2007
149views more  IJISEC 2007»
15 years 3 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
IJNSEC
2011
167views more  IJNSEC 2011»
14 years 10 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
TITB
2008
204views more  TITB 2008»
15 years 2 months ago
A Cryptographic Approach to Securely Share and Query Genomic Sequences
To support large-scale biomedical research projects, organizations need to share person-specific genomic sequences without violating the privacy of their data subjects. In the past...
Murat Kantarcioglu, Wei Jiang, Ying Liu, Bradley M...
IEEEARES
2006
IEEE
15 years 9 months ago
Application of the Digraph Method in System Fault Diagnostics
There is an increasing demand for highly reliable systems in the safety conscious climate of today’s world. When a fault does occur there are two desirable outcomes. Firstly, de...
E. M. Kelly, L. M. Bartlett
OOPSLA
2001
Springer
15 years 7 months ago
Contract Soundness for Object-Oriented Languages
Checking pre- and post-conditions of procedures and methods at runtime helps improve software reliability. In the procedural world, pre- and post-conditions have a straightforward...
Robert Bruce Findler, Matthias Felleisen