Sciweavers

315 search results - page 5 / 63
» Arrows for secure information flow
Sort
View
110
Voted
CSFW
1996
IEEE
15 years 8 months ago
A Logic of Composition for Information Flow Predicates
Ramesh V. Peri, William A. Wulf, Darrell M. Kienzl...
118
Voted
CRISIS
2008
15 years 5 months ago
Policy-based intrusion detection in Web applications by monitoring Java information flows
Guillaume Hiet, Valérie Viet Triem Tong, Lu...
84
Voted
ACJ
2006
47views more  ACJ 2006»
15 years 4 months ago
Securing UML Information Flow Using FlowUML
Khaled Alghathbar, Csilla Farkas, Duminda Wijeseke...
IEEEARES
2009
IEEE
15 years 1 months ago
Quantitative Analysis of Secure Information Flow via Probabilistic Semantics
We present an automatic analyzer for measuring information flow within software systems. In this paper, we quantify leakage in terms of information theory and incorporate this comp...
Chunyan Mu, David Clark
117
Voted
ASIAN
2003
Springer
126views Algorithms» more  ASIAN 2003»
15 years 7 months ago
Information Flow Security for XML Transformations
Abstract. We provide a formal definition of information flows in XML transformations and, more generally, in the presence of type driven computations and describe a sound technique...
Véronique Benzaken, Marwan Burelle, Giusepp...