Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
722
search results - page 6 / 145
»
Information Theory and Security: Quantitative Information Fl...
Sort
relevance
views
votes
recent
update
View
thumb
title
32
click to vote
ACMSE
2006
ACM
162
views
Theoretical Computer Science
»
more
ACMSE 2006
»
Type inference and informative error reporting for secure information flow
14 years 2 months ago
Download
users.cs.fiu.edu
If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Zhenyue Deng, Geoffrey Smith
claim paper
Read More »
15
click to vote
CCS
2008
ACM
81
views
Security Privacy
»
more
CCS 2008
»
Trust management for secure information flows
13 years 10 months ago
Download
www.usukita.org
Mudhakar Srivatsa, Shane Balfe, Kenneth G. Paterso...
claim paper
Read More »
31
click to vote
WISTP
2007
Springer
87
views
Security Privacy
»
more
WISTP 2007
»
An Information Flow Verifier for Small Embedded Systems
14 years 2 months ago
Download
wistp2007.wistp.org
Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-...
claim paper
Read More »
21
click to vote
CSFW
1996
IEEE
101
views
Security Privacy
»
more
CSFW 1996
»
A Logic of Composition for Information Flow Predicates
14 years 18 days ago
Download
www.cs.virginia.edu
Ramesh V. Peri, William A. Wulf, Darrell M. Kienzl...
claim paper
Read More »
34
click to vote
CRISIS
2008
103
views
Security Privacy
»
more
CRISIS 2008
»
Policy-based intrusion detection in Web applications by monitoring Java information flows
13 years 10 months ago
Download
www.rennes.supelec.fr
Guillaume Hiet, Valérie Viet Triem Tong, Lu...
claim paper
Read More »
« Prev
« First
page 6 / 145
Last »
Next »