Sciweavers

196 search results - page 11 / 40
» Compositional information flow security for concurrent progr...
Sort
View
SIGADA
2004
Springer
14 years 27 days ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
ESOP
2001
Springer
14 years 1 days ago
Secure Information Flow and CPS
Security-typed languages enforce confidentiality or integrity policies by type checking. This paper investigates continuation-passing style (CPS) translation of such languages as ...
Steve Zdancewic, Andrew C. Myers
ESIAT
2009
IEEE
13 years 5 months ago
Research and Realization of Geospatial Information Service Orchestration Based on BPEL
Geospatial information services composition is a promising approach to construct complex Web GIS applications. BPEL, which is the language and the industry standard that expresses ...
Xiaoliang Meng, Fuling Bian, Yichun Xie
ASPLOS
2009
ACM
14 years 8 months ago
Complete information flow tracking from the gates up
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for example, when handling important cryptographic keys or sensitive financial data. We...
Mohit Tiwari, Hassan M. G. Wassel, Bita Mazloom, S...
CSFW
2004
IEEE
13 years 11 months ago
Lenient Array Operations for Practical Secure Information Flow
Our goal in this paper is to make secure information flow typing more practical. We propose simple and permissive typing rules for array operations in a simple sequential imperati...
Zhenyue Deng, Geoffrey Smith