Sciweavers

2257 search results - page 33 / 452
» Secure program partitioning
Sort
View
CCS
2007
ACM
14 years 2 months ago
Analysis of three multilevel security architectures
Various system architectures have been proposed for high assurance enforcement of multilevel security. This paper provides an analysis of the relative merits of three architectura...
Timothy E. Levin, Cynthia E. Irvine, Clark Weissma...
CCS
2011
ACM
12 years 8 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum
POPL
1998
ACM
14 years 28 days ago
The SLam Calculus: Programming with Secrecy and Integrity
The SLam calculus is a typed -calculus that maintains security information as well as type information. The type system propagates security information for each object in four for...
Nevin Heintze, Jon G. Riecke
OOPSLA
2007
Springer
14 years 2 months ago
Streamflex: high-throughput stream programming in java
Jesper Honig Spring, Jean Privat, Rachid Guerraoui...
OOPSLA
2005
Springer
14 years 2 months ago
Ambient-oriented programming
Jessie Dedecker, Tom Van Cutsem, Stijn Mostinckx, ...