Sciweavers

2257 search results - page 120 / 452
» Secure program partitioning
Sort
View
IFIP
2009
Springer
14 years 3 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii
CCS
2008
ACM
13 years 10 months ago
Efficient and extensible security enforcement using dynamic data flow analysis
Current taint tracking systems suffer from high overhead and a lack of generality. In this paper, we solve both of these issues with an extensible system that is an order of magni...
Walter Chang, Brandon Streiff, Calvin Lin
EOR
2008
73views more  EOR 2008»
13 years 9 months ago
Strategic planning in fractional aircraft ownership programs
In the fractional ownership model, the partial owner of an aircraft is entitled to certain flight hours per year, and the management company is responsible for all the operational...
Yufeng Yao, Özlem Ergun, Ellis Johnson, Willi...
CSFW
1998
IEEE
14 years 16 days ago
Probabilistic Noninterference in a Concurrent Language
In previous work [16], we give a type system that guarantees that well-typed multithreaded programs are possibilistically noninterfering. If thread scheduling is probabilistic, ho...
Dennis M. Volpano, Geoffrey Smith
SIGSOFT
2007
ACM
14 years 9 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna