Sciweavers

1770 search results - page 325 / 354
» Writing requirements in computer security
Sort
View
TLDI
2010
ACM
190views Formal Methods» more  TLDI 2010»
14 years 4 months ago
Distributed programming with distributed authorization
We propose a programming language, called PCML5, for building distributed applications with distributed access control. Target applications include web-based systems in which prog...
Kumar Avijit, Anupam Datta, Robert Harper
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
14 years 2 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
SOUPS
2009
ACM
14 years 2 months ago
A comparative study of online privacy policies and formats
Abstract. Online privacy policies are difficult to understand. Most privacy policies require a college reading level and an ability to decode legalistic, confusing, or jargon-laden...
Aleecia M. McDonald, Robert W. Reeder, Patrick Gag...
CSFW
2007
IEEE
14 years 2 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
EUROCRYPT
2007
Springer
14 years 1 months ago
Feistel Networks Made Public, and Applications
Feistel Network, consisting of a repeated application of the Feistel Transform, gives a very convenient and popular method for designing “cryptographically strong” permutations...
Yevgeniy Dodis, Prashant Puniya