Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1795
search results - page 9 / 359
»
Security Models and Information Flow
Sort
relevance
views
votes
recent
update
View
thumb
title
94
Voted
CCS
2007
ACM
113
views
Security Privacy
»
more
CCS 2007
»
Verification condition generation for conditional information flow
15 years 9 months ago
Download
people.cis.ksu.edu
Torben Amtoft, Anindya Banerjee
claim paper
Read More »
102
click to vote
ESORICS
2006
Springer
122
views
Security Privacy
»
more
ESORICS 2006
»
From Coupling Relations to Mated Invariants for Checking Information Flow
15 years 7 months ago
Download
www.cs.stevens.edu
David A. Naumann
claim paper
Read More »
99
Voted
ACSAC
2001
IEEE
88
views
Security Privacy
»
more
ACSAC 2001
»
An Information Flow Tool for Gypsy
15 years 7 months ago
Download
www.acsac.org
John McHugh
claim paper
Read More »
106
Voted
CSFW
2010
IEEE
174
views
Security Privacy
»
more
CSFW 2010
»
Quantitative Information Flow - Verification Hardness and Possibilities
15 years 6 months ago
Download
www.kb.ecei.tohoku.ac.jp
Hirotoshi Yasuoka, Tachio Terauchi
claim paper
Read More »
168
Voted
JCS
2008
124
views
more
JCS 2008
»
Securing information flow via dynamic capture of dependencies
15 years 3 months ago
Download
www.cs.jhu.edu
Although static systems for information flow security are well-studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct adv...
Paritosh Shroff, Scott F. Smith, Mark Thober
claim paper
Read More »
« Prev
« First
page 9 / 359
Last »
Next »