Sciweavers

1795 search results - page 118 / 359
» Security Models and Information Flow
Sort
View
138
Voted
APVIS
2011
14 years 3 months ago
Edge maps: Representing flow with bounded error
Robust analysis of vector fields has been established as an important tool for deriving insights from the complex systems these fields model. Many analysis techniques rely on co...
Harsh Bhatia, Shreeraj Jadhav, Peer-Timo Bremer, G...
IWCMC
2010
ACM
15 years 5 months ago
Secure wireless communication platform for EV-to-Grid research
"Vehicle to Grid" power or V2G will be a new green energy scheme that allows electricity to flow from Electric Vehicles (EVs) to power lines. The objective of this paper...
Huaqun Guo, Fan Yu, Wai-Choong Wong, Vivy Suhendra...
OSDI
2008
ACM
16 years 4 months ago
Hardware Enforcement of Application Security Policies Using Tagged Memory
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware pag...
Nickolai Zeldovich, Hari Kannan, Michael Dalton, C...
129
Voted
QEST
2010
IEEE
15 years 1 months ago
Information Hiding in Probabilistic Concurrent Systems
Information hiding is a general concept which refers to the goal of preventing an adversary to infer secret information from the observables. Anonymity and Information Flow are exa...
Miguel E. Andrés, Catuscia Palamidessi, Pet...
244
Voted
ISF
2011
14 years 10 months ago
Leveraging information sharing to configure supply chains
As supply chains evolve beyond the confines of individual organizations, information sharing has become the holy grail in supply chain technology. Although the value of information...
Rong Liu, Akhil Kumar