Sciweavers

6812 search results - page 62 / 1363
» Detection of Information Flows
Sort
View
IFIP
2009
Springer
15 years 11 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii
CSR
2007
Springer
15 years 11 months ago
Decidability of Parameterized Probabilistic Information Flow
In this paper, we consider the decidability of two problems related to information flow in a system with respect to some property. A flow occurs in a system if the conditional pr...
Danièle Beauquier, Marie Duflot, Yury Lifsh...
ADVCS
2008
83views more  ADVCS 2008»
15 years 3 months ago
Information Flows in Causal Networks
We introduce a notion of causal independence based on virtual intervention, which is a fundamental concept of the theory of causal networks. Causal independence allows for de ning ...
Nihat Ay, Daniel Polani
SAC
2009
ACM
15 years 11 months ago
Visualization of information flows in a very large social network
In this paper, we present our research result that enables users to navigate a very large social network and to take a look at information flows on the network. To this end, we d...
Shin Gyu Kim, Hyuck Han, Kyungho Jeon, Hyungsoo Ju...
SPC
2005
Springer
15 years 10 months ago
A Theorem Proving Approach to Analysis of Secure Information Flow
Abstract. Most attempts at analysing secure information flow in programs are based on domain-specific logics. Though computationally feahese approaches suffer from the need for ...
Ádám Darvas, Reiner Hähnle, Dav...