Browsing by Subject "security"
Now showing items 1-5 of 5
-
Information Flow for Secure Distributed Applications
(2009-08-27)Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...
-
A Security Kernel Based on the Lambda-Calculus
(1996-03-13)Cooperation between independent agents depends upon establishing adegree of security. Each of the cooperating agents needs assurance that the cooperation will not endanger resources of value to that agent. In a computer ...
-
Symbolic Execution for (Almost) Free: Hijacking an Existing Implementation to Perform Symbolic Execution
(2014-04-22)Symbolic execution of a language is traditionally achieved by replacing the language s interpreter with an entirely new interpreter. This may be an unnecessary burden, and it is tempting instead to try to use as much of ...
-
Toward Secure Services from Untrusted Developers
(2007-08-06)We present a secure service prototype built from untrusted,contributed code.The service manages private data for a variety of different users, anduser programs frequently require access to other users' private data.However, ...
-
Whanaungatanga: Sybil-proof routing with social networks
(2009-09-24)Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed ...