Sciweavers

2486 search results - page 55 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
133
Voted
JLP
2007
86views more  JLP 2007»
15 years 3 months ago
Typing noninterference for reactive programs
We propose a type system to enforce the security property of noninterference in a core reactive language, obtained by extending the imperative language of Volpano, Smith and Irvin...
Ana Almeida Matos, Gérard Boudol, Ilaria Ca...
136
Voted
IDA
2009
Springer
15 years 10 months ago
Selecting Computer Architectures by Means of Control-Flow-Graph Mining
Abstract Deciding which computer architecture provides the best performance for a certain program is an important problem in hardware design and benchmarking. While previous approa...
Frank Eichinger, Klemens Böhm
137
Voted
TISSEC
2010
142views more  TISSEC 2010»
14 years 10 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
134
Voted
UIALL
2004
Springer
15 years 9 months ago
A New Visualization Concept for Navigation Systems
At present, various types of car navigation systems are progressively entering the market. Simultaneously, mobile outdoor navigation systems for pedestrians and electronic tourist ...
Wolfgang Narzt, Gustav Pomberger, Alois Ferscha, D...
136
Voted
CCS
2008
ACM
15 years 5 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...