Sciweavers

739 search results - page 16 / 148
» Information Flow in Credential Systems
Sort
View
CSR
2007
Springer
14 years 1 months ago
Decidability of Parameterized Probabilistic Information Flow
In this paper, we consider the decidability of two problems related to information flow in a system with respect to some property. A flow occurs in a system if the conditional pr...
Danièle Beauquier, Marie Duflot, Yury Lifsh...
IDTRUST
2010
ACM
14 years 13 days ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch
CONCUR
2010
Springer
13 years 8 months ago
Session Types for Access and Information Flow Control
We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both sessi...
Sara Capecchi, Ilaria Castellani, Mariangiola Deza...
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
14 years 2 months ago
EM Enforcing Information Flow Properties using Compensating Events
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
Thoshitha T. Gamage, Bruce M. McMillin
ESOP
2007
Springer
13 years 11 months ago
A Certified Lightweight Non-interference Java Bytecode Verifier
Non-interference is a semantical condition on programs that guarantees the absence of illicit information flow throughout their execution, and that can be enforced by appropriate i...
Gilles Barthe, David Pichardie, Tamara Rezk