Sciweavers

1527 search results - page 6 / 306
» Demographic information flows
Sort
View
FM
2008
Springer
130views Formal Methods» more  FM 2008»
13 years 9 months ago
Specification and Checking of Software Contracts for Conditional Information Flow
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
Torben Amtoft, John Hatcliff, Edwin Rodrígu...
JCS
2008
124views more  JCS 2008»
13 years 7 months ago
Securing information flow via dynamic capture of dependencies
Although static systems for information flow security are well-studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct adv...
Paritosh Shroff, Scott F. Smith, Mark Thober
ASPLOS
2009
ACM
14 years 8 months ago
Complete information flow tracking from the gates up
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for example, when handling important cryptographic keys or sensitive financial data. We...
Mohit Tiwari, Hassan M. G. Wassel, Bita Mazloom, S...
ENTER
2007
Springer
14 years 1 months ago
Combination of Information Sources in Travel Planning A Cross-national Study
This paper presents results from a study about the Internet as an information source for travel planning based on interviews with travelers in 13 countries in 2005. In 1997, a sim...
Ingvar Tjøstheim, Iis P. Tussyadiah, Sigrid...
CCS
2010
ACM
13 years 7 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...