Sciweavers

93 search results - page 4 / 19
» Dynamic security labels and static information flow control
Sort
View
CSFW
2007
IEEE
13 years 11 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
13 years 11 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
BIRTHDAY
2008
Springer
13 years 9 months ago
Secure Data Flow in a Calculus for Context Awareness
Abstract. We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infrastructure-based Ubiquitous Computing setting. In our calculus, computin...
Doina Bucur, Mogens Nielsen
CDC
2010
IEEE
147views Control Systems» more  CDC 2010»
13 years 2 months ago
Asymmetric information diffusion via gossiping on static and dynamic networks
In this paper we consider the problem of gossiping in a network to diffuse the average of a sub-set of nodes, called sources, and directing it to another sub-set of nodes in the ne...
Mehmet Ercan Yildiz, Anna Scaglione, Asuman E. Ozd...
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
13 years 5 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer