Sciweavers

154 search results - page 12 / 31
» Secure file system versioning at the block level
Sort
View
ESE
2006
97views Database» more  ESE 2006»
13 years 7 months ago
An empirical study of fine-grained software modifications
Software is typically improved and modified in small increments (we refer to each of these increments as a modification record--MR). MRs are usually stored in a configuration manag...
Daniel M. Germán
CSFW
1996
IEEE
13 years 11 months ago
Comparing Two Information Flow Security Properties
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...
Riccardo Focardi
HICSS
1999
IEEE
97views Biometrics» more  HICSS 1999»
13 years 11 months ago
The Ragnarok Architectural Software Configuration Management Model
The architecture is the fundamental framework for designing and implementing large scale software, and the ability to trace and control its evolution is essential. However, many t...
Henrik Bærbak Christensen
CCS
2009
ACM
14 years 2 months ago
Secure open source collaboration: an empirical study of linus' law
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
Andrew Meneely, Laurie A. Williams
FSE
2010
Springer
153views Cryptology» more  FSE 2010»
14 years 6 days ago
Rotational Cryptanalysis of ARX
In this paper we analyze the security of systems based on modular additions, rotations, and XORs (ARX systems). We provide both theoretical support for their security and practical...
Dmitry Khovratovich, Ivica Nikolic