Sciweavers

6527 search results - page 59 / 1306
» On Typing Information Flow
Sort
View
COMPSAC
2009
IEEE
15 years 10 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
BIS
2010
197views Business» more  BIS 2010»
15 years 2 months ago
Ubiquitous Microblogging: A Flow-Based Front-End for Information Logistics
The success of information supply strongly depends on successful user adoption. This especially is the case for the integration of non-human information sources deriving from ubiqu...
Martin Böhringer, Martin Gaedke
CISS
2007
IEEE
15 years 10 months ago
Detecting Information Flows: Improving Chaff Tolerance by Joint Detection
— The problem of detecting encrypted information flows using timing information is considered. An information flow consists of both information-carrying packets and irrelevant ...
Ting He, Lang Tong
116
Voted
FOSSACS
2009
Springer
15 years 10 months ago
On the Foundations of Quantitative Information Flow
There is growing interest in quantitative theories of information flow in a variety of contexts, such as secure information flow, anonymity protocols, and side-channel analysis. ...
Geoffrey Smith
IFIP
2009
Springer
15 years 10 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii