Sciweavers

4731 search results - page 33 / 947
» Securing Interactive Programs
Sort
View
OOPSLA
2009
Springer
14 years 3 months ago
Coherent reaction
Side effects are both the essence and bane of imperative programming. The programmer must carefully coordinate actions to manage their side effects upon each other. Such coordinat...
Jonathan Edwards
CCS
2007
ACM
14 years 2 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
ICWS
2007
IEEE
13 years 10 months ago
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
Security enforcement framework is an important aspect of any distributed system. With new requirements imposed by SOA-based business models, adaptive security enforcement on the a...
Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitr...
CHI
2007
ACM
14 years 9 months ago
Designing software for consumers to easily set up a secure home network
Brenton Elmore, Stuart Hamilton, Subbarao Ivaturi
CHI
2007
ACM
14 years 9 months ago
Security user studies: methodologies and best practices
Serge Egelman, Jennifer King, Robert C. Miller, Ni...