Sciweavers

454 search results - page 21 / 91
» Making distributed systems secure with program analysis and ...
Sort
View
ISSTA
2004
ACM
14 years 29 days ago
Testing malware detectors
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware detector (commonly known as virus scanner) attempts to identify malware. In spite...
Mihai Christodorescu, Somesh Jha
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
13 years 5 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer
CL
2007
Springer
13 years 7 months ago
A bulk-synchronous parallel process algebra
The CCS (Calculus of Communicating Systems) process algebra is a well-known formal model of synchronization and communication. It is used for the analysis of safety and liveness i...
Armelle Merlin, Gaétan Hains
CCS
2007
ACM
14 years 1 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
EMO
2005
Springer
107views Optimization» more  EMO 2005»
14 years 1 months ago
Multiobjective Water Pinch Analysis of the Cuernavaca City Water Distribution Network
Water systems often allow efficient water uses via water reuse and/or recirculation. Defining the network layout connecting water-using processes is a complex problem which involv...
Carlos E. Mariano-Romero, Víctor Alcocer-Ya...