Sciweavers

311 search results - page 6 / 63
» Secure Information Flow by Self-Composition
Sort
View
82
Voted
ACJ
2006
47views more  ACJ 2006»
15 years 3 months ago
Securing UML Information Flow Using FlowUML
Khaled Alghathbar, Csilla Farkas, Duminda Wijeseke...
116
Voted
ASIAN
2003
Springer
126views Algorithms» more  ASIAN 2003»
15 years 7 months ago
Information Flow Security for XML Transformations
Abstract. We provide a formal definition of information flows in XML transformations and, more generally, in the presence of type driven computations and describe a sound technique...
Véronique Benzaken, Marwan Burelle, Giusepp...
ACSAC
2010
IEEE
15 years 1 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
118
Voted
ACSC
2006
IEEE
15 years 7 months ago
Tracing secure information flow through mode changes
Communications devices intended for use in securitycritical applications must be rigorously evaluated to ensure they preserve data confidentiality. This process includes tracing t...
Colin J. Fidge, Tim McComb