Sciweavers

2257 search results - page 87 / 452
» Secure program partitioning
Sort
View
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
14 years 17 days ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
PLDI
2010
ACM
14 years 6 months ago
Type-preserving Compilation for End-to-end Verification of Security Enforcement
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
Juan Chen, Ravi Chugh, Nikhil Swamy
MOZ
2004
Springer
14 years 2 months ago
The Structure of Authority: Why Security Is Not a Separable Concern
Common programming practice grants excess authority for the sake of functionality; programming principles require least authority for the sake of security. If we practice our princ...
Mark S. Miller, Bill Tulloh, Jonathan S. Shapiro
TGC
2007
Springer
14 years 2 months ago
A Protocol Compiler for Secure Sessions in ML
Distributed applications can be structured using sessions that specify flows of messages between roles. We design a small specific language to declare sessions. We then build a c...
Ricardo Corin, Pierre-Malo Deniélou
INFOSCALE
2006
ACM
14 years 2 months ago
A dynamic mechanism for handling mobile computing environmental changes
--Nowadays, the issue of the energy saving on the mobile client is becoming more and more concerned. Among those power conservation techniques, computation offloading schemes are b...
MingJian Tang, Jinli Cao