Sciweavers

182 search results - page 2 / 37
» Enforcing Robust Declassification
Sort
View
CSFW
2008
IEEE
14 years 3 months ago
Tractable Enforcement of Declassification Policies
Gilles Barthe, Salvador Cavadini, Tamara Rezk
POPL
2008
ACM
14 years 8 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
ICDCS
2012
IEEE
11 years 11 months ago
Securing Virtual Coordinates by Enforcing Physical Laws
—Virtual coordinate systems (VCS) provide accurate estimations of latency between arbitrary hosts on a network, while conducting a small amount of actual measurements and relying...
Jeffrey Seibert, Sheila Becker, Cristina Nita-Rota...
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
14 years 23 days ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov
ICPR
2010
IEEE
13 years 7 months ago
A Game-Theoretic Approach to Robust Selection of Multi-View Point Correspondence
In this paper we introduce a robust matching technique that allows to operate a very accurate selection of corresponding feature points from multiple views. Robustness is achieved...
Emanuele Rodolà, Andrea Albarelli, Andrea Torsell...