Sciweavers

429 search results - page 21 / 86
» Compositionality of Secure Information Flow
Sort
View
MPC
1998
Springer
81views Mathematics» more  MPC 1998»
15 years 7 months ago
A Semantic Approach to Secure Information Flow
K. Rustan M. Leino, Rajeev Joshi
ICDCSW
2000
IEEE
15 years 6 months ago
Secure Information Flow in Mobile Bootstrapping Process
Zhaoyu Liu, M. Dennis Mickunas, Roy H. Campbell
147
Voted
ESORICS
2010
Springer
15 years 3 months ago
Flexible Scheduler-Independent Security
Abstract We propose an approach to certify the information flow security of multi-threaded programs independently from the scheduling algorithm. A scheduler-independent verificatio...
Heiko Mantel, Henning Sudbrock
ATVA
2010
Springer
163views Hardware» more  ATVA 2010»
15 years 3 months ago
Automatic Generation of History-Based Access Control from Information Flow Specification
This paper proposes a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-b...
Yoshiaki Takata, Hiroyuki Seki