Sciweavers

83 search results - page 8 / 17
» Secured Information Flow for Asynchronous Sequential Process...
Sort
View
ICALT
2006
IEEE
14 years 3 months ago
Online Discussion Processes: Effects of Earlier Messages' Evaluations, Knowledge Content, Social Cues and Personal Information o
This study of the flow of online discussions examined how earlier messages affected later messages along five dimensions: (1) evaluations (agree, disagree, or unresponsive actions...
Gaowei Chen, Ming Ming Chiu
BIRTHDAY
2008
Springer
13 years 11 months ago
Secure Data Flow in a Calculus for Context Awareness
Abstract. We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infrastructure-based Ubiquitous Computing setting. In our calculus, computin...
Doina Bucur, Mogens Nielsen
CCS
2007
ACM
14 years 4 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
CAU
2004
192views Cryptology» more  CAU 2004»
13 years 11 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
IFIP
2009
Springer
14 years 4 months ago
Analysing the Information Flow Properties of Object-Capability Patterns
We consider the problem of detecting covert channels within security-enforcing object-capability patterns. Traditional formalisms for reasoning about the security properties of obj...
Toby C. Murray, Gavin Lowe