Sciweavers

92 search results - page 10 / 19
» Secure Information Flow as a Safety Problem
Sort
View
CSFW
2004
IEEE
13 years 11 months ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong
ISI
2006
Springer
13 years 7 months ago
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework
Information dissemination is of vital importance in today's information-centric world. However, controlling the flow of information across multiple security domains is a probl...
Ragib Hasan, Marianne Winslett
CSFW
1999
IEEE
13 years 11 months ago
Process Algebra and Non-Interference
The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
Peter Y. A. Ryan, Steve A. Schneider
IEEEIAS
2008
IEEE
14 years 1 months ago
Developing a Security Typed Java Servlet
: The Lack of security policy enforcement in web development languages is one of the most important challenges in web application systems development, as there is no formal check f...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
MVA
2002
128views Computer Vision» more  MVA 2002»
13 years 7 months ago
Application to the Traffic Occlusion with Multiple Views
Recently, since the traffic is increasing every year, the problems of traffic jam and accidents, and so on, are increasing, it is required that the ITS (Intelligent Transport Syst...
Tameharu Hasegawa, Heitoh Zen