Sciweavers

2486 search results - page 106 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
ELPUB
2006
ACM
14 years 2 months ago
NARCIS: The Gateway to Dutch Scientific Information
NARCIS, National Academic Research and Collaborations Information System, is a project in the Netherlands to build a portal for research information which combines structured rese...
Elly Dijk, Chris Baars, Arjan Hogenaar, Marga van ...
SAC
2004
ACM
14 years 2 months ago
Web Services: separation of concerns: computation coordination communication
The purpose of this paper is to investigate the use of a new concept in component communication, expressed by the channel based coordination language called ρέω, in the coordina...
Theophilos A. Limniotes, George A. Papadopoulos, F...
SIGSOFT
2008
ACM
14 years 9 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
DBSEC
2006
115views Database» more  DBSEC 2006»
13 years 10 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 9 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg