Sciweavers

848 search results - page 28 / 170
» Secure Information Flow for Distributed Systems
Sort
View
OSDI
2000
ACM
13 years 8 months ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz
CCS
2006
ACM
13 years 10 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
13 years 12 months ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
TMM
2002
133views more  TMM 2002»
13 years 6 months ago
A model for secure multimedia document database system in a distributed environment
Abstract--The Internet provides a universal platform for largescale distribution of information and supports inter-organizational services, system integration, and collaboration. U...
James B. D. Joshi, Zhaohui Kevin Li, Husni Fahmi, ...
ESORICS
2008
Springer
13 years 8 months ago
Termination-Insensitive Noninterference Leaks More Than Just a Bit
Current tools for analysing information flow in programs build upon ideas going back to Denning's work from the 70's. These systems enforce an imperfect notion of informa...
Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, D...