Sciweavers

201 search results - page 10 / 41
» Security Properties of Typed Applets
Sort
View
ICUMT
2009
13 years 5 months ago
Information flow security for service compositions
Web services are ubiquitous technologies which are used for integrating business processes and services. As is the case in many other applications, the information processed in we...
Sabina Rossi, Damiano Macedonio
ICICS
2007
Springer
14 years 1 months ago
Drive-By Pharming
Inexpensive broadband routers are a popular way for people to create an internal, and sometimes wireless, network in their homes. By purchasing such a router and plugging it in, t...
Sid Stamm, Zulfikar Ramzan, Markus Jakobsson
OOPSLA
2010
Springer
13 years 6 months ago
Task types for pervasive atomicity
Atomic regions are an important concept in correct concurrent programming: since atomic regions can be viewed as having executed in a single step, atomicity greatly reduces the nu...
Aditya Kulkarni, Yu David Liu, Scott F. Smith
POPL
2000
ACM
14 years 2 days ago
Enforcing Trace Properties by Program Transformation
We propose an automatic method to enforce trace properties on programs. The programmer specifies the property separately from the program; a program transformer takes the program...
Thomas Colcombet, Pascal Fradet
ENTCS
2002
84views more  ENTCS 2002»
13 years 7 months ago
Set Types and Applications
We present pmlB, a programming language that includes primitive sets and associated operations. The language is equipped with a precise type discipline that statically captures dy...
Christian Skalka, Scott F. Smith