Sciweavers

1795 search results - page 49 / 359
» Security Models and Information Flow
Sort
View
TIT
2008
73views more  TIT 2008»
13 years 9 months ago
Detection of Information Flows
Abstract-- Distributed detection of information flows by timing analysis is considered. Timing measurements are subject to perturbations and the insertion of chaff noise. Moreover,...
Ting He, Lang Tong
AISM
2004
13 years 11 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
CSFW
1999
IEEE
14 years 1 months ago
Process Algebra and Non-Interference
The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
Peter Y. A. Ryan, Steve A. Schneider
CSR
2007
Springer
14 years 3 months ago
Decidability of Parameterized Probabilistic Information Flow
In this paper, we consider the decidability of two problems related to information flow in a system with respect to some property. A flow occurs in a system if the conditional pr...
Danièle Beauquier, Marie Duflot, Yury Lifsh...
CORR
2007
Springer
69views Education» more  CORR 2007»
13 years 9 months ago
Wireless Network Information Flow
— We present an achievable rate for general deterministic relay networks, with broadcasting at the transmitters and interference at the receivers. In particular we show that if t...
Amir Salman Avestimehr, Suhas N. Diggavi, David N....