Sciweavers

315 search results - page 30 / 63
» Arrows for secure information flow
Sort
View
CAU
2004
192views Cryptology» more  CAU 2004»
13 years 9 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
ACSAC
1998
IEEE
13 years 12 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
JCS
2011
74views more  JCS 2011»
13 years 2 months ago
Model-checking trace-based information flow properties
In this paper we consider the problem of verifying trace-based information flow properties for different classes of system models. We begin by proposing an automata-theoretic te...
Deepak D'Souza, Raveendra Holla, K. R. Raghavendra...
IPPS
2008
IEEE
14 years 2 months ago
Scalable dynamic information flow tracking and its applications
We are designing scalable dynamic information flow tracking techniques and employing them to carry out tasks related to debugging (bug location and fault avoidance), security (so...
Rajiv Gupta, Neelam Gupta, Xiangyu Zhang, Dennis J...
CONCUR
2001
Springer
14 years 6 days ago
Probabilistic Information Flow in a Process Algebra
We present a process algebraic approach for extending to the probabilistic setting the classical logical information flow analysis of computer systems. In particular, we employ a ...
Alessandro Aldini