Sciweavers

69 search results - page 9 / 14
» Towards Semantics for Provenance Security
Sort
View
POPL
2010
ACM
14 years 7 months ago
Toward a Verified Relational Database Management System
We report on our experience implementing a lightweight, fully verified relational database management system (RDBMS). The functional specification of RDBMS behavior, RDBMS impleme...
Avraham Shinnar, Greg Morrisett, J. Gregory Malech...
ISW
2007
Springer
14 years 4 months ago
Towards a DL-Based Additively Homomorphic Encryption Scheme
ElGamal scheme has been the first encryption scheme based on discrete logarithm. One of its main advantage is that it is simple, natural and efficient, but also that its security ...
Guilhem Castagnos, Benoît Chevallier-Mames
IEEEARES
2008
IEEE
14 years 4 months ago
Matching Policies with Security Claims of Mobile Applications
The Security-by-Contract (S×C) framework has been recently proposed to address the trust relationship problem of the current security model adopted for mobile devices. The key id...
Nataliia Bielova, Marco Dalla Torre, Nicola Dragon...
COMPSAC
2009
IEEE
14 years 4 months ago
A Contextual Guidance Approach to Software Security
With the ongoing trend towards the globalization of software systems and their development, components in these systems might not only work together, but may end up evolving indep...
Philipp Schügerl, David Walsh, Juergen Rillin...
SIGCOMM
1997
ACM
14 years 2 months ago
A Flow-Based Approach to Datagram Security
Datagram services provide a simple, exible, robust, and communication abstraction; their usefulness has been well demonstrated by the success of IP, UDP, and RPC. Yet, the overwh...
Suvo Mittra, Thomas Y. C. Woo