Sciweavers

731 search results - page 12 / 147
» Special Section on Information and Communication System Secu...
Sort
View
ICDCSW
2005
IEEE
14 years 2 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
CSFW
1995
IEEE
14 years 8 days ago
Composing and decomposing systems under security properties
We investigate the formal relationship between separability of processes and the types of non-interference properties they enjoy. Though intuitively appealing, separability – th...
A. W. Roscoe, L. Wulf
JCS
2008
124views more  JCS 2008»
13 years 8 months ago
Securing information flow via dynamic capture of dependencies
Although static systems for information flow security are well-studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct adv...
Paritosh Shroff, Scott F. Smith, Mark Thober
ALIFE
1999
13 years 8 months ago
An Approach to Biological Computation: Unicellular Core-Memory Creatures Evolved Using Genetic Algorithms
A novel machine language genetic programming system that uses one-dimensional core memories is proposed and simulated. The core is compared to a biochemical reaction space, and in ...
Hikeaki Suzuki
ICCCN
2007
IEEE
14 years 3 months ago
Interplay of Security and Reliability using Non-uniform Checkpoints
Real time applications such as military aircraft flight control systems and online banking are critical with respect to security and reliability. In this paper we presented a way ...
Kiranmai Bellam, Raghava K. Vudata, Xiao Qin, Zili...