Sciweavers

429 search results - page 8 / 86
» Compositionality of Secure Information Flow
Sort
View
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
14 years 6 days ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov
ASIAN
2006
Springer
104views Algorithms» more  ASIAN 2006»
13 years 11 months ago
Closing Internal Timing Channels by Transformation
Abstract. A major difficulty for tracking information flow in multithreaded programs is due to the internal timing covert channel. Information is leaked via this channel when secre...
Alejandro Russo, John Hughes, David A. Naumann, An...
ACMSE
2006
ACM
14 years 1 months ago
Type inference and informative error reporting for secure information flow
If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Zhenyue Deng, Geoffrey Smith
SFM
2010
Springer
202views Formal Methods» more  SFM 2010»
13 years 12 months ago
Information Theory and Security: Quantitative Information Flow
Pasquale Malacaria, Jonathan Heusser
CCS
2010
ACM
13 years 8 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...