Sciweavers

429 search results - page 70 / 86
» Compositionality of Secure Information Flow
Sort
View
SOCIALCOM
2010
13 years 5 months ago
A Decision Theoretic Approach to Data Leakage Prevention
Abstract--In both the commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information. In this paper we address the threat of infor...
Janusz Marecki, Mudhakar Srivatsa, Pradeep Varakan...
SAC
2000
ACM
14 years 10 days ago
The Mobile Agent Technology to Support and to Access Museum Information
The global scenario put together by communication networks determines new opportunities towards the realization of Internetbased distributed services in many complex and composite...
Paolo Bellavista, Antonio Corradi, Andrea Tomasi
SUM
2010
Springer
13 years 6 months ago
Event Modelling and Reasoning with Uncertain Information for Distributed Sensor Networks
CCTV and sensor based surveillance systems are part of our daily lives now in this modern society due to the advances in telecommunications technology and the demand for better sec...
Jianbing Ma, Weiru Liu, Paul Miller
ACSD
2008
IEEE
108views Hardware» more  ACSD 2008»
14 years 2 months ago
PicNIc - Pi-calculus non-interference checker
PICNIC is a tool for verifying security properties of systems, namely non-interference properties of processes expressed as terms of the π-calculus with two security levels and d...
Silvia Crafa, Matteo Mio, Marino Miculan, Carla Pi...
CCS
2010
ACM
13 years 8 months ago
DIFC programs by automatic instrumentation
Decentralized information flow control (DIFC) operating systems provide applications with mechanisms for enforcing information-flow policies for their data. However, significant o...
William R. Harris, Somesh Jha, Thomas W. Reps