Sciweavers

1599 search results - page 7 / 320
» Program Analysis for Security and Privacy
Sort
View
105
Voted
ISSE
2010
15 years 29 days ago
Lightweight analysis of access control models with description logic
Christiano Braga, Edward Hermann Haeusler
CSREASAM
2010
14 years 12 months ago
Using Traffic Analysis to Identify Tor Usage - A Proposed Study
John Barker, Peter Hannay, Christopher Bolan
70
Voted
SOUPS
2009
ACM
15 years 9 months ago
Privacy stories: confidence in privacy behaviors through end user programming
Luke Church, Jonathan Anderson, Joseph Bonneau, Fr...
58
Voted
IEEEARES
2007
IEEE
15 years 8 months ago
On Programming Models for Service-Level High Availability
Christian Engelmann, Stephen L. Scott, Chokchai Le...