Browsing by Subject "security"

Now showing items 1-5 of 5

  • Information Flow for Secure Distributed Applications 

    Unknown author (2009-08-27)
    Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

  • A Security Kernel Based on the Lambda-Calculus 

    Unknown author (1996-03-13)
    Cooperation between independent agents depends upon establishing adegree of security. Each of the cooperating agents needs assurance that the cooperation will not endanger resources of value to that agent. In a computer ...

  • Symbolic Execution for (Almost) Free: Hijacking an Existing Implementation to Perform Symbolic Execution 

    Unknown author (2014-04-22)
    Symbolic execution of a language is traditionally achieved by replacing the language s interpreter with an entirely new interpreter. This may be an unnecessary burden, and it is tempting instead to try to use as much of ...

  • Toward Secure Services from Untrusted Developers 

    Unknown author (2007-08-06)
    We present a secure service prototype built from untrusted,contributed code.The service manages private data for a variety of different users, anduser programs frequently require access to other users' private data.However, ...

  • Whanaungatanga: Sybil-proof routing with social networks 

    Unknown author (2009-09-24)
    Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed ...