Sciweavers

2429 search results - page 195 / 486
» Using Aspects to Design a Secure System
Sort
View
OOPSLA
2001
Springer
15 years 7 months ago
The Java Syntactic Extender
The ability to extend a language with new syntactic forms is a powerful tool. A sufficiently flexible macro system allows programmers to build from a common base towards a langua...
Jonathan Bachrach, Keith Playford
134
Voted
SOSP
2009
ACM
15 years 11 months ago
Improving application security with data flow assertions
RESIN is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy obje...
Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Fra...
120
Voted
FSE
1998
Springer
102views Cryptology» more  FSE 1998»
15 years 6 months ago
Cryptanalytic Attacks on Pseudorandom Number Generators
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
108
Voted
ACSAC
2010
IEEE
15 years 20 days ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
AGENTS
2001
Springer
15 years 7 months ago
CMPack: a complete software system for autonomous legged soccer robots
This paper describes a completely implemented, fully autonomous software system for soccer playing quadruped robots. The system includes real-time color vision, probabilistic loca...
Scott Lenser, James Bruce, Manuela M. Veloso