Sciweavers

1795 search results - page 41 / 359
» Security Models and Information Flow
Sort
View
DEON
2008
Springer
13 years 9 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
CASSIS
2005
Springer
14 years 1 months ago
Information Flow Analysis for a Typed Assembly Language with Polymorphic Stacks
Abstract. We study secure information flow in a stack based Typed Assembly Language (TAL). We define a TAL with an execution stack and establish the soundness of its type system ...
Eduardo Bonelli, Adriana B. Compagnoni, Ricardo Me...
SIGIR
2006
ACM
14 years 1 months ago
Personalized recommendation driven by information flow
We propose that the information access behavior of a group of people can be modeled as an information flow issue, in which people intentionally or unintentionally influence and in...
Xiaodan Song, Belle L. Tseng, Ching-Yung Lin, Ming...
CSFW
2010
IEEE
13 years 11 months ago
Dynamic vs. Static Flow-Sensitive Security Analysis
—This paper seeks to answer fundamental questions about trade-offs between static and dynamic security analysis. It has been previously shown that flow-sensitive static informat...
Alejandro Russo, Andrei Sabelfeld
ICIS
2003
13 years 9 months ago
Leveraging Information Sharing to Increase Supply Chain Configurability
As supply chains evolve beyond the confines of individual organizations, collaboration has become the Holy Grail in supply chain technology. It plays a key role in achieving flexi...
Emily "Rong" Liu, Akhil Kumar