Sciweavers

2257 search results - page 286 / 452
» Secure program partitioning
Sort
View
CSFW
2006
IEEE
14 years 4 months ago
Secrecy by Typing and File-Access Control
Secrecy properties can be guaranteed through a combination of static and dynamic checks. The static checks may include the application of special type systems with notions of secr...
Avik Chaudhuri, Martín Abadi
SP
2006
IEEE
127views Security Privacy» more  SP 2006»
14 years 4 months ago
Siren: Catching Evasive Malware (Short Paper)
With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...
Kevin Borders, Xin Zhao, Atul Prakash
ICALP
2005
Springer
14 years 3 months ago
Computationally Sound Implementations of Equational Theories Against Passive Adversaries
In this paper we study the link between formal and cryptographic models for security protocols in the presence of a passive adversary. In contrast to other works, we do not conside...
Mathieu Baudet, Véronique Cortier, Steve Kr...
ICALP
2005
Springer
14 years 3 months ago
Hierarchical Group Signatures
We introduce the notion of hierarchical group signatures. This is a proper generalization of group signatures, which allows multiple group managers organized in a tree with the si...
Mårten Trolin, Douglas Wikström
GCC
2003
Springer
14 years 3 months ago
Information Grid Toolkit: Infrastructure of Shanghai Information Grid
A fundamental problem that confronts Shanghai Information Grid is to adopt a good Grid toolkit, since the “de facto” standard Globus Toolkit does not support Information Grid w...
Xinhua Lin, Qianni Deng, Xinda Lu