Sciweavers

1599 search results - page 11 / 320
» Program Analysis for Security and Privacy
Sort
View
103
Voted
PAISI
2010
Springer
15 years 1 months ago
An Association Model for Implicit Crime Link Analysis
Jau-Hwang Wang, Chien-Lung Lin
101
Voted
OOPSLA
2010
Springer
15 years 19 days ago
Patterns and statistical analysis for understanding reduced resource computing
Martin C. Rinard, Henry Hoffmann, Sasa Misailovic,...
146
Voted
ESORICS
2010
Springer
15 years 2 months ago
Flexible Scheduler-Independent Security
Abstract We propose an approach to certify the information flow security of multi-threaded programs independently from the scheduling algorithm. A scheduler-independent verificatio...
Heiko Mantel, Henning Sudbrock
182
Voted
POPL
2012
ACM
13 years 10 months ago
Probabilistic relational reasoning for differential privacy
Differential privacy is a notion of confidentiality that protects the privacy of individuals while allowing useful computations on their private data. Deriving differential priva...
Gilles Barthe, Boris Köpf, Federico Olmedo, S...