Sciweavers

4731 search results - page 139 / 947
» Securing Interactive Programs
Sort
View
ECIS
2001
13 years 10 months ago
An Interactive Telecommunications Degree with Vision for the Future
This paper presents a new curriculum for the Internet and e-business that has been developed at University of Redlands in Southern California with first offering in 2000. The pape...
James B. Pick, Sunny J. Baker
IFIP
2009
Springer
14 years 3 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii
CCS
2008
ACM
13 years 10 months ago
Efficient and extensible security enforcement using dynamic data flow analysis
Current taint tracking systems suffer from high overhead and a lack of generality. In this paper, we solve both of these issues with an extensible system that is an order of magni...
Walter Chang, Brandon Streiff, Calvin Lin
ATAL
2005
Springer
14 years 2 months ago
Engineering agent interactions from ACL-based reusable connectors
This paper reports on the RICA−J multiagent programming framework, which provides executable constructs for each of the organizational, ACL-based modelling abstractions of the R...
Juan Manuel Serrano, Sascha Ossowski, Sergio Sauga...
CAV
2011
Springer
207views Hardware» more  CAV 2011»
13 years 18 days ago
Interactive Synthesis of Code Snippets
Abstract. We describe a tool that applies theorem proving technology to synthesize code fragments that use given library functions. To determine candidate code fragments, our appro...
Tihomir Gvero, Viktor Kuncak, Ruzica Piskac