Sciweavers

6527 search results - page 8 / 1306
» On Typing Information Flow
Sort
View
EWC
2000
94views more  EWC 2000»
13 years 7 months ago
A Model for the Flow of Design Information in Product Development
The complexity of modern products and design tools has made the exchange of design information more complex. It is widely recognised that the seamless capture, storage, and retriev...
Steven B. Shooter, Walid Keirouz, Simon Szykman, S...
IJNSEC
2007
142views more  IJNSEC 2007»
13 years 7 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...
IJISEC
2007
149views more  IJISEC 2007»
13 years 7 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
CASSIS
2004
Springer
14 years 26 days ago
History-Based Access Control and Secure Information Flow
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the for...
Anindya Banerjee, David A. Naumann
ESOP
2001
Springer
13 years 12 months ago
Secure Information Flow and CPS
Security-typed languages enforce confidentiality or integrity policies by type checking. This paper investigates continuation-passing style (CPS) translation of such languages as ...
Steve Zdancewic, Andrew C. Myers