Sciweavers

2290 search results - page 42 / 458
» Extensible Protected Types
Sort
View
IEEESP
2010
126views more  IEEESP 2010»
13 years 6 months ago
Privacy-Preserving Sharing of Sensitive Information
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
Salvatore J. Stolfo, Gene Tsudik
JOT
2007
95views more  JOT 2007»
13 years 7 months ago
The Infer Type Refactoring and its Use for Interface-Based Programming
Interface-based programming, i.e. the systematic use of interface types in variable declarations, serves the decoupling of classes and increases a program’s changeability. To ma...
Friedrich Steimann
ESOP
2006
Springer
13 years 11 months ago
A Typed Assembly Language for Confidentiality
Language-based information-flow analysis is promising in protecting data confidentiality. Although much work has been carried out in this area, relatively little has been done for ...
Dachuan Yu, Nayeem Islam
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 7 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
CCS
2004
ACM
14 years 1 months ago
Authenticity by tagging and typing
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei