Sciweavers

1795 search results - page 28 / 359
» Security Models and Information Flow
Sort
View
TSE
2010
120views more  TSE 2010»
13 years 6 months ago
Time and Probability-Based Information Flow Analysis
Abstract—In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial stud...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...
ACSAC
2003
IEEE
14 years 28 days ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
ICTAC
2005
Springer
14 years 1 months ago
On Typing Information Flow
Abstract. We investigate the issue of typing confidentiality in a languagebased information-flow security approach, aiming at improving some previously proposed type systems, esp...
Gérard Boudol
WSC
2004
13 years 9 months ago
Design Specifications of a Generic Supply Chain Simulator
This paper describes a design specification for a generic, supply-chain-simulation system. The proposed simulation system is based on schedule-driven and stock-driven control meth...
Shigeki Umeda, Y. Tina Lee
ICCS
2001
Springer
14 years 2 days ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...