Sciweavers

1795 search results - page 52 / 359
» Security Models and Information Flow
Sort
View
132
Voted
SACMAT
2009
ACM
15 years 10 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
133
Voted
CRYPTO
1999
Springer
103views Cryptology» more  CRYPTO 1999»
15 years 8 months ago
Information Theoretically Secure Communication in the Limited Storage Space Model
Abstract. We provide a simple secret-key two-party secure communication scheme, which is provably information-theoretically secure in the limited-storage-space model. The limited-s...
Yonatan Aumann, Michael O. Rabin
147
Voted
VMCAI
2005
Springer
15 years 9 months ago
Information Flow Analysis for Java Bytecode
Abstract. We present a context-sensitive compositional analysis of information flow for full (mono-threaded) Java bytecode. Our idea consists in transforming the Java bytecode int...
Samir Genaim, Fausto Spoto
131
Voted
MMMACNS
2010
Springer
15 years 2 months ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...
127
Voted
ICPR
2000
IEEE
15 years 8 months ago
Optic-Flow Information Extraction with Directional Gaussian-Derivatives
This work is intended to give some ideas to extract motion information from an image sequence. A directional energy is defined in terms of the 1-D Hermite transform coefficients o...
J. Luis Silván-Cárdenas, Boris Escal...