Sciweavers

429 search results - page 78 / 86
» Compositionality of Secure Information Flow
Sort
View
IEEECIT
2009
IEEE
14 years 2 months ago
Dynamic Software Product Lines for Service-Based Systems
—Ageing populations and the necessity to reduce environmental impact raise new challenges on our living buildings. Convergence of home control systems (air conditioning, light ma...
Paul Istoan, Grégory Nain, Gilles Perrouin,...
SECURWARE
2008
IEEE
14 years 2 months ago
Rating Agencies Interoperation for Peer-to-Peer Online Transactions
— In current peer-to-peer systems users interact with unknown services and users for the purpose of online transactions such as file sharing and trading of commodities. Peer-to-...
Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Lui...
IH
2001
Springer
14 years 12 days ago
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum fo...
Darko Kirovski, Henrique S. Malvar
SACMAT
2009
ACM
14 years 2 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
AOSD
2009
ACM
13 years 12 months ago
The dataflow pointcut: a formal and practical framework
Some security concerns are sensitive to flow of information in a program execution. The dataflow pointcut has been proposed by Masuhara and Kawauchi in order to easily implement s...
Dima Alhadidi, Amine Boukhtouta, Nadia Belblidia, ...