Sciweavers

4731 search results - page 44 / 947
» Securing Interactive Programs
Sort
View
CN
2000
76views more  CN 2000»
13 years 8 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
ERLANG
2007
ACM
14 years 20 days ago
Learning programming with Erlang
This paper presents an interactive framework for pupils to learn the basic concepts of programming by means of the functional programming language Erlang. Beside the idea of the f...
Frank Huch
JMLC
2000
Springer
14 years 9 days ago
Derivation of Secure Parallel Applications by Means of Module Embedding
An enhancement to modular languages called module embedding facilitates the development and utilization of secure generic parallel algorithms.
Atanas Radenski
ACSAC
1999
IEEE
14 years 1 months ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur
ESOP
2003
Springer
14 years 1 months ago
On the Secure Implementation of Security Protocols
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the cont...
Pablo Giambiagi, Mads Dam