Sciweavers

87 search results - page 17 / 18
» Generic record combinators with static type checking
Sort
View
CCS
1999
ACM
13 years 11 months ago
A High-Performance Network Intrusion Detection System
In this paper we present a new approach for network intrusion detection based on concise speciļ¬cations that characterize normal and abnormal network packet sequences. Our speciļ...
R. Sekar, Y. Guang, S. Verma, T. Shanbhag
PEPM
1999
ACM
13 years 11 months ago
Certifying Compilation and Run-Time Code Generation
A certifying compiler takes a source language program and produces object code, as well as a certi cate" that can be used to verify that the object code satis es desirable pr...
Luke Hornof, Trevor Jim
ESOP
2008
Springer
13 years 9 months ago
Just Forget It - The Semantics and Enforcement of Information Erasure
Abstract. There are many settings in which sensitive information is made available to a system or organisation for a specific purpose, on the understanding that it will be erased o...
Sebastian Hunt, David Sands
CIDR
2007
208views Algorithms» more  CIDR 2007»
13 years 9 months ago
Impliance: A Next Generation Information Management Appliance
Though database technology has been remarkably successful in building a large market and adapting to the changes of the last three decades, its impact on the broader market of inf...
Bishwaranjan Bhattacharjee, Joseph S. Glider, Rich...
ESOP
2009
Springer
14 years 2 months ago
All Secrets Great and Small
Tools for analysing secure information ļ¬‚ow are almost exclusively based on ideas going back to Denningā€™s work from the 70ā€™s. This approach embodies an imperfect notion of sec...
Delphine Demange, David Sands