Sciweavers

1795 search results - page 24 / 359
» Security Models and Information Flow
Sort
View
107
Voted
MPC
2010
Springer
156views Mathematics» more  MPC 2010»
15 years 7 months ago
Compositionality of Secure Information Flow
Catuscia Palamidessi
125
Voted
ICDCSW
2000
IEEE
15 years 7 months ago
Secure Information Flow in Mobile Bootstrapping Process
Zhaoyu Liu, M. Dennis Mickunas, Roy H. Campbell
ESORICS
2010
Springer
15 years 3 months ago
Flexible Scheduler-Independent Security
Abstract We propose an approach to certify the information flow security of multi-threaded programs independently from the scheduling algorithm. A scheduler-independent verificatio...
Heiko Mantel, Henning Sudbrock
DEBS
2009
ACM
15 years 10 months ago
PrivateFlow: decentralised information flow control in event based middleware
Complex middleware frameworks are made out of interacting components which may include bugs. These frameworks are often extended to provide additional features by thirdparty exten...
Ioannis Papagiannis, Matteo Migliavacca, Peter R. ...
223
Voted
POPL
2004
ACM
16 years 3 months ago
Asynchronous and deterministic objects
We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette