Sciweavers

1599 search results - page 7 / 320
» Program Analysis for Security and Privacy
Sort
View
105
Voted
ISSE
2010
15 years 1 months ago
Lightweight analysis of access control models with description logic
Christiano Braga, Edward Hermann Haeusler
CSREASAM
2010
14 years 12 months ago
Using Traffic Analysis to Identify Tor Usage - A Proposed Study
John Barker, Peter Hannay, Christopher Bolan
71
Voted
SOUPS
2009
ACM
15 years 9 months ago
Privacy stories: confidence in privacy behaviors through end user programming
Luke Church, Jonathan Anderson, Joseph Bonneau, Fr...
58
Voted
IEEEARES
2007
IEEE
15 years 9 months ago
On Programming Models for Service-Level High Availability
Christian Engelmann, Stephen L. Scott, Chokchai Le...