Sciweavers

2335 search results - page 48 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
90
Voted
EDOC
2006
IEEE
15 years 8 months ago
Information Security Guidance for Enterprise Transformation
John A. Anderson, Vijaykumar Rachamadugu
CCS
2005
ACM
15 years 8 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
104
Voted
EUC
2005
Springer
15 years 8 months ago
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow
Abstract. For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protec...
Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakura...
143
Voted
PLDI
2009
ACM
15 years 9 months ago
Catch me if you can: permissive yet secure error handling
Program errors are a source of information leaks. Tracking these leaks is hard because error propagation breaks out of program structure. Programming languages often feature excep...
Aslan Askarov, Andrei Sabelfeld
110
Voted
SERP
2008
15 years 4 months ago
Mapping Data-Flow Dependencies onto Distributed Embedded Systems
Model-driven development (MDD) is an emerging paradigm and has become state-of-the-art for embedded systems software design. In the overall design process, several steps have to be...
Stefan Kugele, Wolfgang Haberl