Sciweavers

2257 search results - page 64 / 452
» Secure program partitioning
Sort
View
COMPSAC
2006
IEEE
14 years 2 months ago
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Yonggang Zhang, Juergen Rilling, Volker Haarslev
AOSD
2010
ACM
14 years 3 months ago
Disambiguating aspect-oriented security policies
Many software security policies can be encoded as aspects that identify and guard security-relevant program operations. Bugs in these aspectually-implemented security policies oft...
Micah Jones, Kevin W. Hamlen
OOPSLA
2004
Springer
14 years 2 months ago
Measuring the dynamic behaviour of AspectJ programs
Bruno Dufour, Christopher Goard, Laurie J. Hendren...
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 8 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
POPL
2004
ACM
14 years 9 months ago
Separation and information hiding
We investigate proof rules for information hiding, using the recent formalism of separation logic. In essence, we use the separating conjunction to partition the internal resource...
Peter W. O'Hearn, Hongseok Yang, John C. Reynolds