Sciweavers

127 search results - page 17 / 26
» Quantifying information leaks in software
Sort
View
EUROSYS
2011
ACM
13 years 2 days ago
Striking a new balance between program instrumentation and debugging time
Although they are helpful in many cases, state-of-the-art bug reporting systems may impose excessive overhead on users, leak private information, or provide little help to the dev...
Olivier Crameri, Ricardo Bianchini, Willy Zwaenepo...
AC
1998
Springer
14 years 25 days ago
The Search for the Holy Grail in Quantum Cryptography
Abstract. In 1982, Bennett and Brassard suggested a new way to provide privacy in long distance communications with security based on the correctness of the basic principles of qua...
Louis Salvail
POPL
1996
ACM
14 years 22 days ago
Using Parameterized Signatures to Express Modular Structure
Module systems are a powerful, practical tool for managing the complexity of large software systems. Previous attempts to formulate a type-theoretic foundation for modular program...
Mark P. Jones
WWW
2007
ACM
14 years 9 months ago
Supporting end-users in the creation of dependable web clips
Web authoring environments enable end-users to create applications that integrate information from other web sources. Users can create web sites that include built-in components t...
Sandeep Lingam, Sebastian G. Elbaum
WWW
2010
ACM
14 years 1 months ago
Redundancy detection in service-oriented systems
This paper addresses the problem of identifying redundant data in large-scale service-oriented information systems. Specifically, the paper puts forward an automated method to pi...
Peep Küngas, Marlon Dumas