Sciweavers

427 search results - page 28 / 86
» Improving software security with a C pointer analysis
Sort
View
EWCBR
2004
Springer
13 years 11 months ago
Using CBR for Semantic Analysis of Software Specifications
Abstract. Helping software designers in their task implies the development of tools with intelligent capabilities. One such capability is the integration of natural language unders...
Nuno Seco, Paulo Gomes, Francisco C. Pereira
IRI
2006
IEEE
14 years 1 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
SBACPAD
2003
IEEE
103views Hardware» more  SBACPAD 2003»
14 years 27 days ago
Profiling and Optimization of Software-Based Network-Analysis Applications
A large set of tools for network monitoring and accounting, security, traffic analysis and prediction — more broadly, for network operation and management — require direct and...
Loris Degioanni, Mario Baldi, Fulvio Risso, Gianlu...
CPE
1998
Springer
81views Hardware» more  CPE 1998»
13 years 12 months ago
Experiments with Improved Approximate Mean Value Analysis Algorithms
Abstract. Approximate Mean Value Analysis (MVA) is a popular technique for analyzing queueing networks because of the efficiency and accuracy that it affords. In this paper, we pre...
Hai Wang, Kenneth C. Sevcik
CCS
2008
ACM
13 years 9 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...