Sciweavers

113 search results - page 8 / 23
» Safe Equivalences for Security Properties
Sort
View
OOPSLA
2009
Springer
14 years 7 days ago
Relooper: refactoring for loop parallelism in Java
In the multicore era, sequential programs need to be refactored for parallelism. The next version of Java provides ParallelArray, an array datastructure that supports parallel ope...
Danny Dig, Mihai Tarce, Cosmin Radoi, Marius Minea...
POPL
2000
ACM
14 years 1 days ago
Enforcing Trace Properties by Program Transformation
We propose an automatic method to enforce trace properties on programs. The programmer specifies the property separately from the program; a program transformer takes the program...
Thomas Colcombet, Pascal Fradet
CSFW
2004
IEEE
13 years 11 months ago
Modelling Downgrading in Information Flow Security
Information flow security properties such as noninterference ensure the protection of confidential data by strongly limiting the flow of sensitive information. However, to deal wi...
Annalisa Bossi, Carla Piazza, Sabina Rossi
SDMW
2009
Springer
14 years 2 months ago
L-Cover: Preserving Diversity by Anonymity
To release micro-data tables containing sensitive data, generalization algorithms are usually required for satisfying given privacy properties, such as k-anonymity and l-diversity....
Lei Zhang 0004, Lingyu Wang, Sushil Jajodia, Alexa...
CSFW
2008
IEEE
13 years 9 months ago
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus
We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part of this...
Michael Backes, Catalin Hritcu, Matteo Maffei