Sciweavers

2486 search results - page 49 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
13 years 10 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...
TIC
2000
Springer
110views System Software» more  TIC 2000»
14 years 8 days ago
Program Representation Size in an Intermediate Language with Intersection and Union Types
Abstract. The CIL compiler for core Standard ML compiles whole programs using a novel typed intermediate language (TIL) with intersection and union types and flow labels on both te...
Allyn Dimock, Ian Westmacott, Robert Muller, Frank...
MASCOTS
2008
13 years 10 months ago
Network Information Flow in Network of Queues
Two classic categories of models exist for computer networks: network information flow and network of queues. The network information flow model appropriately captures the multi-ho...
Phillipa Gill, Zongpeng Li, Anirban Mahanti, Jingx...
DRM
2006
Springer
14 years 11 days ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
ACSW
2003
13 years 10 months ago
Location Management in Pervasive Systems
Pervasive systems require context awareness in order to be able to provide “anywhere, anytime” computing to mobile users. One type of context information is location informati...
Jadwiga Indulska, Peter Sutton