Sciweavers

224 search results - page 28 / 45
» An Information Flow Verifier for Small Embedded Systems
Sort
View
SIGSOFT
2008
ACM
14 years 8 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
GI
2009
Springer
14 years 5 days ago
TaxiMedia: An Interactive Context-Aware Entertainment and Advertising System
: The use of public transport vehicles, such as trams, buses, and taxis as an advertising space is increasing since several years. However mainly the outside of the vehicles is use...
Florian Alt, Alireza Sahami Shirazi, Max Pfeiffer,...
TISSEC
2010
142views more  TISSEC 2010»
13 years 2 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
ESORICS
2011
Springer
12 years 7 months ago
To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data
The rapid progress of human genome studies leads to a strong demand of aggregate human DNA data (e.g, allele frequencies, test statistics, etc.), whose public dissemination, howeve...
Xiao-yong Zhou, Bo Peng, Yong Fuga Li, Yangyi Chen...
SAMOS
2010
Springer
13 years 5 months ago
OpenCL-based design methodology for application-specific processors
OpenCL is a programming language standard which enables the programmer to express the application by structuring its computation as kernels. The OpenCL compiler is given the explic...
Pekka O. Jaskelainen, Carlos S. de La Lama, Pablo ...