Sciweavers

1528 search results - page 153 / 306
» Performance Assertion Checking
Sort
View
CCS
2010
ACM
15 years 2 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
GRID
2007
Springer
15 years 2 months ago
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS
In this paper, we present a role-based access control method for accessing databases through the Open Grid Services Architecture – Data Access and Integration (OGSA-DAI) framewor...
Anil L. Pereira, Vineela Muppavarapu, Soon M. Chun...
147
Voted
JOC
2011
157views more  JOC 2011»
14 years 9 months ago
Universally Composable Symbolic Security Analysis
In light of the growing complexity of cryptographic protocols and applications, it becomes highly desirable to mechanize — and eventually automate — the security analysis of p...
Ran Canetti, Jonathan Herzog
163
Voted
KCAP
2011
ACM
14 years 5 months ago
Multipedia: enriching DBpedia with multimedia information
Enriching knowledge bases with multimedia information makes it possible to complement textual descriptions with visual and audio information. Such complementary information can he...
Andrés García-Silva, Max Jakob, Pabl...
229
Voted
PLDI
2009
ACM
16 years 3 months ago
SoftBound: highly compatible and complete spatial memory safety for c
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking are well known, yet C and C++ remain in widespread use. Unfortunately, C's a...
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Mar...