Sciweavers

6527 search results - page 96 / 1306
» On Typing Information Flow
Sort
View
JCS
2006
118views more  JCS 2006»
13 years 7 months ago
Enforcing Robust Declassification and Qualified Robustness
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems release sensitive information as part of their in...
Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
TIP
2010
165views more  TIP 2010»
13 years 2 months ago
Physically Consistent and Efficient Variational Denoising of Image Fluid Flow Estimates
Imaging plays an important role in experimental fluid dynamics. It is equally important both for scientific research and a range of industrial applications. It is known, however, t...
Andrey Vlasenko, Christoph Schnörr
WEBI
2005
Springer
14 years 1 months ago
Tracking Information Epidemics in Blogspace
Beyond serving as online diaries, weblogs have evolved into a complex social structure, one which is in many ways ideal for the study of the propagation of information. As weblog ...
Eytan Adar, Lada A. Adamic
AMAST
2008
Springer
13 years 9 months ago
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
A simple type confusion attack occurs in a security protocol, when a principal interprets data of one type as data of another. These attacks can be successfully prevented by \taggi...
Han Gao, Chiara Bodei, Pierpaolo Degano
SAS
2005
Springer
114views Formal Methods» more  SAS 2005»
14 years 1 months ago
Type-Safe Optimisation of Plugin Architectures
Programmers increasingly implement plugin architectures in type-safe object-oriented languages such as Java. A virtual machine can dynamically load class files containing plugins,...
Neal Glew, Jens Palsberg, Christian Grothoff