Sciweavers

519 search results - page 74 / 104
» Control flow obfuscation with information flow tracking
Sort
View
WWW
2004
ACM
14 years 9 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
CAISE
2006
Springer
14 years 16 days ago
IT Service Processes - State and Open Issues
- Extended Abstract of Industrial Talk IT services are an important means to achieve competitive advantages by creating new business models or by reducing costs. Furthermore, there...
Rainer Schmidt
DSN
2004
IEEE
14 years 16 days ago
Data-Aware Multicast
This paper presents a multicast algorithm for peer-topeer dissemination of events in a distributed topic-based publish-subscribe system, where processes publish events of certain ...
Sébastien Baehni, Patrick Th. Eugster, Rach...
ENTCS
2006
90views more  ENTCS 2006»
13 years 8 months ago
A Framework for Engineering Interactions in Java-based Component Systems
This paper describes a Java-based framework for the development of componentbased software systems supporting the specification of the logic of component interactions as a first-c...
Antonio Natali, Enrico Oliva, Alessandro Ricci, Mi...
CCS
2010
ACM
13 years 9 months ago
DIFC programs by automatic instrumentation
Decentralized information flow control (DIFC) operating systems provide applications with mechanisms for enforcing information-flow policies for their data. However, significant o...
William R. Harris, Somesh Jha, Thomas W. Reps