Suchergebnisse - ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security AND Protection*
-
1
Autoren: et al.
Weitere Verfasser: et al.
Quelle: ISSN: 2299-0984 ; Proceedings on Privacy Enhancing Technologies ; https://hal.science/hal-02413588 ; Proceedings on Privacy Enhancing Technologies, 2020, 2020 (2), pp.5-23. ⟨10.2478/popets-2020-0015⟩ ; https://doi.org/10.2478/popets-2020-0015.
Schlagwörter: Functional encryption, information leakage, privacy-preserving classification, ACM: C.: Computer Systems Organization/C.1: PROCESSOR ARCHITECTURES/C.1.3: Other Architecture Styles/C.1.3.7: Neural nets, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.2: Cryptographic controls, ACM: I.: Computing Methodologies/I.2: ARTIFICIAL INTELLIGENCE/I.2.6: Learning/I.2.6.6: Parameter learning, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI], [INFO.INFO-NE]Computer Science [cs]/Neural and Evolutionary Computing [cs.NE]
Verfügbarkeit: https://hal.science/hal-02413588
https://hal.science/hal-02413588v1/document
https://hal.science/hal-02413588v1/file/%5B22990984%20-%20Proceedings%20on%20Privacy%20Enhancing%20Technologies%5D%20Illuminating%20the%20Dark%20or%20how%20to%20recover%20what%20should%20not%20be%20seen%20in%20FE-based%20classifiers.pdf
https://doi.org/10.2478/popets-2020-0015 -
2
Autoren: et al.
Weitere Verfasser: et al.
Quelle: CDVE 2018 : 15th International Conference on Cooperative Design, Visualization and Engineering ; https://hal.science/hal-01831965 ; CDVE 2018 : 15th International Conference on Cooperative Design, Visualization and Engineering, Oct 2018, Hangzou, China. pp.176-183, ⟨10.1007/978-3-030-00560-3_24⟩ ; http://www.cdve.org/
Schlagwörter: ACM: H.: Information Systems/H.5: INFORMATION INTERFACES AND PRESENTATION (e.g., HCI)/H.5.1: Multimedia Information Systems/H.5.1.1: Artificial, augmented, and virtual realities, HCI)/H.5.2: User Interfaces/H.5.2.4: Graphical user interfaces (GUI), HCI)/H.5.2: User Interfaces/H.5.2.15: User-centered design, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, [INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR], [INFO.INFO-HC]Computer Science [cs]/Human-Computer Interaction [cs.HC], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
3
Autoren: et al.
Weitere Verfasser: et al.
Quelle: Computers & Security. 50:33-46
Schlagwörter: Fault Tree Analysis, Java Card Security, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, 0211 other engineering and technologies, 02 engineering and technology, Smart Card, [INFO.INFO-ES] Computer Science [cs]/Embedded Systems, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], Countermeasures, Logical Attack, 0202 electrical engineering, electronic engineering, information engineering, ACM: D.: Software/D.4: OPERATING SYSTEMS, [INFO.INFO-ES]Computer Science [cs]/Embedded Systems, Evaluation, Control Flow Transfer, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
Dateibeschreibung: application/pdf
Zugangs-URL: https://hal.inria.fr/hal-01211370/file/15-CompSecu.pdf
https://inria.hal.science/hal-01211370v1
https://doi.org/10.1016/j.cose.2015.01.004
https://inria.hal.science/hal-01211370v1/document
https://hal.inria.fr/hal-01211370/document
https://www.sciencedirect.com/science/article/pii/S016740481500005X
https://hal.inria.fr/hal-01211370
https://dblp.uni-trier.de/db/journals/compsec/compsec50.html#BouffardL15 -
4
Autoren: et al.
Weitere Verfasser: et al.
Quelle: FPS 2017 - 10th International Symposium on Foundations & Practice of Security ; https://hal.science/hal-01596010 ; FPS 2017 - 10th International Symposium on Foundations & Practice of Security, Oct 2017, Nancy, France. pp.53-67, ⟨10.1007/978-3-319-75650-9_4⟩
Schlagwörter: ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
5
Autoren: et al.
Weitere Verfasser: et al.
Quelle: 7th ACM SIGPLAN International Conference on Certified Programs and Proofs (CPP)
7th ACM SIGPLAN International Conference on Certified Programs and Proofs (CPP), Jan 2018, Los Angeles, United States. pp.130--145, ⟨10.1145/3167090⟩Schlagwörter: Program Verification, Weakest Preconditions, Information-Flow Control, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], Relational Verification, Monadic Effects, [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL], Program Equivalence and Refinement, Certified Optimizations, ACM: I.: Computing Methodologies/I.2: ARTIFICIAL INTELLIGENCE/I.2.2: Automatic Programming/I.2.2.4: Program verification, Proof Assistants, SMT-based Automation, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.3: Information flow controls
Zugangs-URL: https://hal.science/hal-01672703
-
6
Autoren: et al.
Weitere Verfasser: et al.
Quelle: 2017 27th International Conference on Field Programmable Logic and Applications (FPL)
https://hal.science/hal-01558473
2017 27th International Conference on Field Programmable Logic and Applications (FPL), Sep 2017, Ghent, Belgium. ⟨10.23919/fpl.2017.8056767⟩
https://www.fpl2017.org/Schlagwörter: Information Flow Tracking, SoC, Zynq, Zynq SoC, CoreSight, ARM Debug components, IFT, Dynamic information flow tracking, DIFT, ACM: B.: Hardware/B.5: REGISTER-TRANSFER-LEVEL IMPLEMENTATION, ACM: B.: Hardware/B.6: LOGIC DESIGN, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, [INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-ES]Computer Science [cs]/Embedded Systems
-
7
Autoren: et al.
Weitere Verfasser: et al.
Quelle: Annual Conference on Privacy, Security and Trust ; https://inria.hal.science/hal-01382971 ; Annual Conference on Privacy, Security and Trust, Dec 2016, Auckland, New Zealand ; http://pst2016.unitec.ac.nz/
Schlagwörter: Software diversity, jit, Security Enforcement, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.4: Processors/D.3.4.1: Compilers, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, [INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Geographisches Schlagwort: Auckland, New Zealand
-
8
Autoren: et al.
Weitere Verfasser: et al.
Quelle: Journal of Complexity. 29:53-75
Schlagwörter: Statistics and Probability, Computer Science - Symbolic Computation, FOS: Computer and information sciences, I.1.2, D.4.6, Control and Optimization, Computer Science - Cryptography and Security, ACM: I.: Computing Methodologies/I.1: SYMBOLIC AND ALGEBRAIC MANIPULATION/I.1.2: Algorithms/I.1.2.0: Algebraic algorithms, 0102 computer and information sciences, Symbolic Computation (cs.SC), 68W40, 13P10, 13P15, 94A60, 01 natural sciences, 13P15, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], 0101 mathematics, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.2: Cryptographic controls, 13P10, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-SC]Computer Science [cs]/Symbolic Computation [cs.SC], Numerical Analysis, Algebra and Number Theory, [INFO.INFO-SC] Computer Science [cs]/Symbolic Computation [cs.SC], Applied Mathematics, MSC10: 68W40, ACM: I.: Computing Methodologies/I.1: SYMBOLIC AND ALGEBRAIC MANIPULATION/I.1.2: Algorithms/I.1.2.1: Analysis of algorithms, 94A60, Cryptography and Security (cs.CR)
Zugangs-URL: http://arxiv.org/abs/1112.6263
https://inria.hal.science/hal-00655745v1
https://doi.org/10.1016/j.jco.2012.07.001
https://dblp.uni-trier.de/db/journals/corr/corr1112.html#abs-1112-6263
https://www.sciencedirect.com/science/article/abs/pii/S0885064X12000611
https://www.pjspaenlehauer.net/data/papers/BarFauSalSpa11.pdf
https://hal.inria.fr/hal-00655745
http://dblp.uni-trier.de/db/journals/corr/corr1112.html#abs-1112-6263
https://www.sciencedirect.com/science/article/pii/S0885064X12000611#!
http://ui.adsabs.harvard.edu/abs/2011arXiv1112.6263B/abstract
https://arxiv.org/abs/1112.6263
https://arxiv.org/pdf/1112.6263.pdf -
9
Autoren: et al.
Weitere Verfasser: et al.
Quelle: ESORICS - 17th European Symposium on Research in Computer Security - 2012 ; https://inria.hal.science/hal-00762252 ; ESORICS - 17th European Symposium on Research in Computer Security - 2012, Sep 2012, Pisa, Italy. pp.806-823, ⟨10.1007/978-3-642-33167-1⟩
Schlagwörter: Malware, behavioral detection, behavior abstraction, trace, term rewriting, model checking, first order temporal logic, finite state automaton, formal language, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checking, [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
-
10
Autoren: et al.
Weitere Verfasser: et al.
Quelle: 40th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - POPL'13 (2013)
https://hal.inria.fr/hal-00780803
40th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - POPL'13 (2013), Jan 2013, Roma, ItalySchlagwörter: ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.4: Processors/D.3.4.1: Compilers, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL], [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
Relation: hal-00780803; https://hal.inria.fr/hal-00780803; https://hal.inria.fr/hal-00780803/document; https://hal.inria.fr/hal-00780803/file/js-star-popl-2013.pdf
-
11
Autoren: et al.
Weitere Verfasser: et al.
Quelle: PLAS - Seventh Workshop on Programming Languages and Analysis for Security ; https://inria.hal.science/hal-00773654 ; PLAS - Seventh Workshop on Programming Languages and Analysis for Security, Jun 2012, Beijing, China. ⟨10.1145/2336717.2336726⟩
Schlagwörter: ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.3: Language Constructs and Features/D.3.3.1: Classes and objects, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.3: Language Constructs and Features/D.3.3.9: Inheritance, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.2: Language Classifications/D.3.2.0: Applicative (functional) languages, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.1: Requirements/Specifications/D.2.1.1: Languages, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.2: Correctness proofs, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.0: Access controls, [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]
-
12
Autoren: et al.
Weitere Verfasser: et al.
Quelle: ACM Multimedia and Security ; https://inria.hal.science/inria-00505875 ; ACM Multimedia and Security, Sep 2009, Princeton, United States
Schlagwörter: ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, [INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing, [SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing
Geographisches Schlagwort: United States
Time: Princeton, United States
-
13
Autoren: et al.
Weitere Verfasser: et al.
Quelle: 1st International Conference on Runtime Verification
https://inria.hal.science/inria-00536500
1st International Conference on Runtime Verification, Howard Barringer, Klaus Havelund, Insup Lee, Nov 2010, St. Julians, Malta. pp.168-182, ⟨10.1007/978-3-642-16612-9_14⟩Schlagwörter: behavioral detection, abstraction, trace, rewriting, finite state automaton, formal language, dynamic binary instrumentation, Malware, behavior abstraction, string rewriting, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Geographisches Schlagwort: St. Julians, Malta
-
14
Autoren: et al.
Weitere Verfasser: et al.
Quelle: 5th International Conference on Malicious and Unwanted Software
https://inria.hal.science/inria-00538376
5th International Conference on Malicious and Unwanted Software, Fernando C. Colón Osorio, Oct 2010, Nancy, FranceSchlagwörter: malware, packing, self-modifying code, slicing techniques, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
-
15
Autoren: et al.
Weitere Verfasser: et al.
Quelle: GREHACK 2013 ; https://inria.hal.science/hal-00872967 ; GREHACK 2013, Guillaume Jeanne, Nov 2013, Grenoble, France
Schlagwörter: ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.4: Communications Management, [INFO.INFO-MC]Computer Science [cs]/Mobile Computing
-
16
Autoren: et al.
Weitere Verfasser: et al.
Quelle: Computer Security Foundations Symposium ; https://inria.hal.science/inria-00161019 ; Computer Security Foundations Symposium, Jul 2007, S. Servolo island, Venice, Italy
Schlagwörter: ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.3: Information flow controls, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.6: Monitors, ACM: F.: Theory of Computation/F.3: LOGICS AND MEANINGS OF PROGRAMS/F.3.2: Semantics of Programming Languages/F.3.2.5: Program analysis, ACM: K.: Computing Milieux/K.4: COMPUTERS AND SOCIETY/K.4.1: Public Policy Issues/K.4.1.5: Privacy, ACM: D.: Software/D.1: PROGRAMMING TECHNIQUES/D.1.3: Concurrent Programming/D.1.3.1: Parallel programming, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.1: Formal Definitions and Theory/D.3.1.0: Semantics, [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
17
Autoren: et al.
Weitere Verfasser: et al.
Quelle: [Research Report] INRIA Paris; Microsoft Research Cambridge. 2016
Schlagwörter: [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], domain validation, ACM: C.: Computer Systems Organization/C.2: COMPUTER-COMMUNICATION NETWORKS/C.2.2: Network Protocols, [INFO.INFO-WB]Computer Science [cs]/Web, [INFO]Computer Science [cs], ACM: C.: Computer Systems Organization/C.2: COMPUTER-COMMUNICATION NETWORKS/C.2.2: Network Protocols/C.2.2.2: Protocol verification, acme, formal verification, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.2: Cryptographic controls, symbolic protocol analysis, proverif
-
18
Autoren: et al.
Weitere Verfasser: et al.
Quelle: CSCW'12 - The Twelfth International Workshop on Collaborative Editing Systems 2012 ; https://inria.hal.science/hal-00761058 ; CSCW'12 - The Twelfth International Workshop on Collaborative Editing Systems 2012, Feb 2012, Seattle, United States
Schlagwörter: ACM: C.: Computer Systems Organization/C.2: COMPUTER-COMMUNICATION NETWORKS/C.2.4: Distributed Systems, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, ACM: K.: Computing Milieux/K.6: MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS/K.6.5: Security and Protection/K.6.5.0: Authentication, [INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC]
Geographisches Schlagwort: Seattle, United States
-
19
Autoren: et al.
Weitere Verfasser: et al.
Quelle: Lecture Notes in Computer Science ; 21st International Workshop on Fast Software Encryption, FSE 2014, London, UK, March 3-5 ; https://inria.hal.science/hal-01044597 ; 21st International Workshop on Fast Software Encryption, FSE 2014, London, UK, March 3-5, Mar 2014, London, United Kingdom. pp.3-17, ⟨10.1007/978-3-662-46706-0_1⟩
Schlagwörter: ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT]
Geographisches Schlagwort: London, United Kingdom
Relation: info:eu-repo/semantics/altIdentifier/arxiv/1412.4626; ARXIV: 1412.4626
-
20
Autoren: et al.
Weitere Verfasser: et al.
Quelle: 7th ACM SIGPLAN International Conference on Certified Programs and Proofs (CPP)
https://hal.archives-ouvertes.fr/hal-01672703
7th ACM SIGPLAN International Conference on Certified Programs and Proofs (CPP), Jan 2018, Los Angeles, United States. pp.130--145, ⟨10.1145/3167090⟩Schlagwörter: Certified Optimizations, Relational Verification, Monadic Effects, Proof Assistants, Program Verification, SMT-based Automation, Weakest Preconditions, Information-Flow Control, Program Equivalence and Refinement, ACM: I.: Computing Methodologies/I.2: ARTIFICIAL INTELLIGENCE/I.2.2: Automatic Programming/I.2.2.4: Program verification, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.3: Information flow controls, [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Geographisches Schlagwort: Los Angeles, United States
Relation: info:eu-repo/semantics/altIdentifier/arxiv/1703.00055; info:eu-repo/grantAgreement//715753/EU/Efficient Formally Secure Compilers to a Tagged Architecture/SECOMP; hal-01672703; https://hal.archives-ouvertes.fr/hal-01672703; ARXIV: 1703.00055
Nájsť tento článok vo Web of Science
Full Text Finder