Sciweavers

4731 search results - page 90 / 947
» Securing Interactive Programs
Sort
View
ACSAC
2000
IEEE
14 years 1 months ago
Extending Java for Package based Access Control
This paper describes an extension of the Java language that provides “programmable security.” The approach augments the Java syntax with constructs for specifying various acce...
John Hale, Mauricio Papa, Oliver Bremer, Rodrigo C...
CCS
2007
ACM
14 years 3 months ago
Privacy-preserving remote diagnostics
We present an efficient protocol for privacy-preserving evaluation of diagnostic programs, represented as binary decision trees or branching programs. The protocol applies a bran...
Justin Brickell, Donald E. Porter, Vitaly Shmatiko...
ICMAS
1998
13 years 10 months ago
An Interaction-Based Model for Situated Agents
This paper enriches the current studies on interaction with a domain where agents have original properties about the interaction. The agents interact with the external world and t...
Bruno Bouzy
CCS
2010
ACM
13 years 7 months ago
TAPS: automatically preparing safe SQL queries
We present the first sound program transformation approach for automatically transforming the code of a legacy web application to employ PREPARE statements in place of unsafe SQL...
Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakris...
SP
2000
IEEE
14 years 13 days ago
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols
Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspec...
John A. Clark, Jeremy L. Jacob