Sciweavers

392 search results - page 72 / 79
» Secure Software Engineering: A New Paradigm
Sort
View
AOSD
2005
ACM
14 years 3 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
EUROSYS
2011
ACM
13 years 1 months ago
Keypad: an auditing file system for theft-prone devices
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...
PLDI
2003
ACM
14 years 3 months ago
CCured in the real world
CCured is a program transformation system that adds memory safety guarantees to C programs by verifying statically that memory errors cannot occur and by inserting run-time checks...
Jeremy Condit, Matthew Harren, Scott McPeak, Georg...
WWW
2004
ACM
14 years 10 months ago
Adapting databases and WebDAV protocol
The ability of the Web to share data regardless of geographical location raises a new issue called remote authoring. With the Internet and Web browsers being independent of hardwa...
Bita Shadgar, Ian Holyer
FOSSACS
2009
Springer
14 years 4 months ago
Bisimulation for Demonic Schedulers
Bisimulation between processes has been proven a successful method for formalizing security properties. We argue that in certain cases, a scheduler that has full information on the...
Konstantinos Chatzikokolakis, Gethin Norman, David...