Sciweavers

429 search results - page 39 / 86
» Compositionality of Secure Information Flow
Sort
View
IFIPTCS
2010
13 years 6 months ago
A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis
Abstract. We propose a framework for reasoning about program security building on language-theoretic and coalgebraic concepts. The behaviour of a system is viewed as a mapping from...
Michele Boreale, David Clark, Daniele Gorla
VISUALIZATION
1993
IEEE
14 years 5 days ago
Flow Volumes for Interactive Vector Field Visualization
Flow volumes are the volumetric equivalent of stream lines. They provide more information about the vector field being visualized than do stream lines or ribbons. Presented is an ...
Nelson L. Max, Barry G. Becker, Roger Crawfis
PLDI
2009
ACM
14 years 2 months ago
Staged information flow for javascript
Modern websites are powered by JavaScript, a flexible dynamic scripting language that executes in client browsers. A common paradigm in such websites is to include third-party Ja...
Ravi Chugh, Jeffrey A. Meister, Ranjit Jhala, Sori...
ISSTA
2010
ACM
13 years 11 months ago
Strict control dependence and its effect on dynamic information flow analyses
Program control dependence has substantial impact on applications such as dynamic information flow tracking and data lineage tracing (a technique tracking the set of inputs that ...
Tao Bao, Yunhui Zheng, Zhiqiang Lin, Xiangyu Zhang...
BPM
2000
Springer
133views Business» more  BPM 2000»
13 years 11 months ago
Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques
Workflow management systems facilitate the everyday operation of business processes by taking care of the logistic control of work. In contrast to traditional information systems, ...
Wil M. P. van der Aalst