Sciweavers

4731 search results - page 8 / 947
» Securing Interactive Programs
Sort
View
IFIP
2010
Springer
13 years 2 months ago
Secure Upgrade of Hardware Security Modules in Bank Networks
Riccardo Focardi, Flaminia L. Luccio
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore
POPL
2001
ACM
14 years 7 months ago
Mobile values, new names, and secure communication
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are ...
Cédric Fournet, Martín Abadi
DSN
2000
IEEE
13 years 12 months ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur
OOPSLA
2009
Springer
14 years 2 months ago
Concurrency by default: using permissions to express dataflow in stateful programs
Sven Stork, Paulo Marques, Jonathan Aldrich