Sciweavers

1795 search results - page 11 / 359
» Security Models and Information Flow
Sort
View
WISTP
2007
Springer
15 years 10 months ago
An Information Flow Verifier for Small Embedded Systems
Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-...
110
Voted
CSFW
1996
IEEE
15 years 8 months ago
A Logic of Composition for Information Flow Predicates
Ramesh V. Peri, William A. Wulf, Darrell M. Kienzl...
118
Voted
CRISIS
2008
15 years 5 months ago
Policy-based intrusion detection in Web applications by monitoring Java information flows
Guillaume Hiet, Valérie Viet Triem Tong, Lu...
83
Voted
ACJ
2006
47views more  ACJ 2006»
15 years 4 months ago
Securing UML Information Flow Using FlowUML
Khaled Alghathbar, Csilla Farkas, Duminda Wijeseke...
IEEEARES
2009
IEEE
15 years 1 months ago
Quantitative Analysis of Secure Information Flow via Probabilistic Semantics
We present an automatic analyzer for measuring information flow within software systems. In this paper, we quantify leakage in terms of information theory and incorporate this comp...
Chunyan Mu, David Clark