Sciweavers

2486 search results - page 22 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
CSFW
1997
IEEE
14 years 25 days ago
Eliminating Covert Flows with Minimum Typings
A type system is given that eliminates two kinds of covert flows in an imperative programming language. The first kind arises from nontermination and the other from partial oper...
Dennis M. Volpano, Geoffrey Smith
TGC
2005
Springer
14 years 2 months ago
Types for Security in a Mobile World
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
Adriana B. Compagnoni, Elsa L. Gunter
ENTCS
2008
136views more  ENTCS 2008»
13 years 8 months ago
A Virtual Machine Based Information Flow Control System for Policy Enforcement
The ability to enforce usage policies attached to data in a fine grained manner requires that the system be able to trace and control the flow of information within it. This paper...
Srijith Krishnan Nair, Patrick N. D. Simpson, Brun...
WWW
2007
ACM
14 years 9 months ago
Identifying and discriminating between web and peer-to-peer traffic in the network core
Traffic classification is the ability to identify and categorize network traffic by application type. In this paper, we consider the problem of traffic classification in the netwo...
Jeffrey Erman, Anirban Mahanti, Martin F. Arlitt, ...
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
14 years 19 days ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...