Sciweavers

429 search results - page 62 / 86
» Compositionality of Secure Information Flow
Sort
View
ESORICS
2008
Springer
13 years 9 months ago
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, ef...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
VEE
2012
ACM
252views Virtualization» more  VEE 2012»
12 years 3 months ago
libdft: practical dynamic data flow tracking for commodity systems
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they propagate during program execution. DFT has been repeatedly implemented by a variety of ...
Vasileios P. Kemerlis, Georgios Portokalidis, Kang...
EDBTW
2006
Springer
13 years 10 months ago
Query Translation for XPath-Based Security Views
Abstract. Since XML is used as a storage format in an increasing number of applications, security has become an important issue in XML databases. One aspect of security is restrict...
Roel Vercammen, Jan Hidders, Jan Paredaens
ESORICS
2008
Springer
13 years 9 months ago
Termination-Insensitive Noninterference Leaks More Than Just a Bit
Current tools for analysing information flow in programs build upon ideas going back to Denning's work from the 70's. These systems enforce an imperfect notion of informa...
Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, D...
CCS
2004
ACM
14 years 1 months ago
Authenticity by tagging and typing
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei