Sciweavers

519 search results - page 6 / 104
» Control flow obfuscation with information flow tracking
Sort
View
CCS
2010
ACM
13 years 7 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...
INFOCOM
1999
IEEE
13 years 12 months ago
A Time-Scale Decomposition Approach to Measurement-Based Admission Control
We propose a time-scale decomposition approach to measurement-based admission control (MBAC). We identify a critical time scale such that: 1) aggregate traffic fluctuation slower t...
Matthias Grossglauser, David N. C. Tse
ETRICS
2006
13 years 11 months ago
Possibilistic Information Flow Control in MAKS and Action Refinement
Abstract. Formal methods emphasizes the need for a top-down approach when developing large reliable software systems. Refinements are map step by step abstract algebraic specificat...
Dieter Hutter
ENTCS
2008
136views more  ENTCS 2008»
13 years 7 months ago
A Virtual Machine Based Information Flow Control System for Policy Enforcement
The ability to enforce usage policies attached to data in a fine grained manner requires that the system be able to trace and control the flow of information within it. This paper...
Srijith Krishnan Nair, Patrick N. D. Simpson, Brun...
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
13 years 11 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...