Sciweavers

2486 search results - page 23 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
ACSAC
2003
IEEE
14 years 1 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
ESOP
2007
Springer
14 years 16 days ago
A Certified Lightweight Non-interference Java Bytecode Verifier
Non-interference is a semantical condition on programs that guarantees the absence of illicit information flow throughout their execution, and that can be enforced by appropriate i...
Gilles Barthe, David Pichardie, Tamara Rezk
EUROSYS
2008
ACM
14 years 5 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
CHI
2007
ACM
14 years 9 months ago
An observational study on information flow during nurses' shift change
We present an observational study that was conducted to guide the design and development of technologies to support information flow during nurses' shift change in a hospital...
Charlotte Tang, M. Sheelagh T. Carpendale
USS
2010
13 years 6 months ago
VEX: Vetting Browser Extensions for Security Vulnerabilities
The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have...
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, ...