Sciweavers

61 search results - page 12 / 13
» Mechanical Verification of Hypercube Algorithms
Sort
View
POPL
2008
ACM
14 years 10 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
ICFP
2003
ACM
14 years 9 months ago
A static type system for JVM access control
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
Tomoyuki Higuchi, Atsushi Ohori
SIGSOFT
2004
ACM
14 years 10 months ago
System architecture: the context for scenario-based model synthesis
Constructing rigorous models for analysing the behaviour of concurrent and distributed systems is a complex task. Our aim is to facilitate model construction. Scenarios provide si...
Jeff Kramer, Jeff Magee, Robert Chatley, Sebasti&a...
SOUPS
2006
ACM
14 years 3 months ago
The methodology and an application to fight against Unicode attacks
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...
GECCO
2006
Springer
213views Optimization» more  GECCO 2006»
14 years 1 months ago
Evolutionary unit testing of object-oriented software using strongly-typed genetic programming
Evolutionary algorithms have successfully been applied to software testing. Not only approaches that search for numeric test data for procedural test objects have been investigate...
Stefan Wappler, Joachim Wegener