Sciweavers

533 search results - page 55 / 107
» Control flow based obfuscation
Sort
View
138
Voted
GLOBECOM
2006
IEEE
15 years 8 months ago
Packet and Flow Level Performance of Wireless Multihop Data Networks
— We consider wireless multihop data networks with random multi-access mechanisms at the MAC layer. Our aim is to study the performance as perceived by users in a dynamic setting...
Nidhi Hegde, Alexandre Proutiere
111
Voted
MIDDLEWARE
2001
Springer
15 years 7 months ago
Thread Transparency in Information Flow Middleware
Abstract. Existing middleware is based on control-flow centric interaction models such as remote method invocations, poorly matching the structure of applications that process con...
Rainer Koster, Andrew P. Black, Jie Huang, Jonatha...
ENTCS
2007
140views more  ENTCS 2007»
15 years 2 months ago
Secured Information Flow for Asynchronous Sequential Processes
We present in this article a precise security model for data confidentiality in the framework of ASP (Asynchronous Sequential Processes). ASP is based on active objects, asynchro...
Isabelle Attali, Denis Caromel, Ludovic Henrio, Fe...
ACSAC
2004
IEEE
15 years 6 months ago
Security Policies to Mitigate Insider Threat in the Document Control Domain
With rapid advances in online technologies, organizations are migrating from paper based resources to digital documents to achieve high responsiveness and ease of management. Thes...
Suranjan Pramanik, Vidyaraman Sankaranarayanan, Sh...
137
Voted
ICSM
1994
IEEE
15 years 6 months ago
A Framework for Partial Data Flow Analysis
Although data pow analysis was first developed for use in compilers, its usefulness is now recognized in many software tools. Because of its compiler origins, the computation of d...
Rajiv Gupta, Mary Lou Soffa