Sciweavers

4731 search results - page 21 / 947
» Securing Interactive Programs
Sort
View
SP
1997
IEEE
130views Security Privacy» more  SP 1997»
13 years 11 months ago
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
MOZ
2004
Springer
14 years 26 days ago
The Oz-E Project: Design Guidelines for a Secure Multiparadigm Programming Language
Abstract. The design and implementation of a capability secure multiparadigm language should be guided from its conception by proven principles of secure language design. In this p...
Fred Spiessens, Peter Van Roy
MHCI
2009
Springer
14 years 2 months ago
Hoverflow: exploring around-device interaction with IR distance sensors
By equipping a mobile device with distance sensing capabilities, we aim to expand the interaction possibilities of mobile and wearable devices beyond the confines of the physical ...
Sven G. Kratz, Michael Rohs
ICALP
2000
Springer
13 years 11 months ago
One-Round Secure Computation and Secure Autonomous Mobile Agents
d Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M
Christian Cachin, Jan Camenisch, Joe Kilian, Joy M...
VIZSEC
2007
Springer
14 years 1 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols