Sciweavers

429 search results - page 21 / 86
» Compositionality of Secure Information Flow
Sort
View
MPC
1998
Springer
81views Mathematics» more  MPC 1998»
14 years 6 days ago
A Semantic Approach to Secure Information Flow
K. Rustan M. Leino, Rajeev Joshi
ICDCSW
2000
IEEE
13 years 11 months ago
Secure Information Flow in Mobile Bootstrapping Process
Zhaoyu Liu, M. Dennis Mickunas, Roy H. Campbell
ESORICS
2010
Springer
13 years 8 months ago
Flexible Scheduler-Independent Security
Abstract We propose an approach to certify the information flow security of multi-threaded programs independently from the scheduling algorithm. A scheduler-independent verificatio...
Heiko Mantel, Henning Sudbrock
ATVA
2010
Springer
163views Hardware» more  ATVA 2010»
13 years 8 months ago
Automatic Generation of History-Based Access Control from Information Flow Specification
This paper proposes a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-b...
Yoshiaki Takata, Hiroyuki Seki