Sciweavers

378 search results - page 53 / 76
» Information Flow Analysis for VHDL
Sort
View
JIPS
2007
100views more  JIPS 2007»
13 years 8 months ago
Static Type Assignment for SSA Form in CTOC
: Although the Java bytecode has numerous advantages, it also has certain shortcomings such as its slow execution speed and difficulty of analysis. In order to overcome such disadv...
Ki-Tae Kim, Weon-Hee Yoo
CADE
2008
Springer
14 years 9 months ago
Precise Dynamic Verification of Confidentiality
Confidentiality is maybe the most popular security property to be formally or informally verified. Noninterference is a baseline security policy to formalize confidentiality of sec...
Gurvan Le Guernic
APVIS
2001
13 years 10 months ago
Visual Mapping of Articulable Tacit Knowledge
Tacit knowledge has long been recognised, however its research has focused largely on who is more likely to have this store of knowledge, rather than taking this one step further ...
Peter Busch, Debbie Richards, Christopher N. G. Da...
ESORICS
2008
Springer
13 years 10 months ago
Termination-Insensitive Noninterference Leaks More Than Just a Bit
Current tools for analysing information flow in programs build upon ideas going back to Denning's work from the 70's. These systems enforce an imperfect notion of informa...
Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, D...
DSN
2004
IEEE
14 years 13 days ago
Data-Aware Multicast
This paper presents a multicast algorithm for peer-topeer dissemination of events in a distributed topic-based publish-subscribe system, where processes publish events of certain ...
Sébastien Baehni, Patrick Th. Eugster, Rach...