Sciweavers

1150 search results - page 9 / 230
» Specifying Information-Flow Controls
Sort
View
134
Voted
ICUMT
2009
15 years 11 days ago
Information flow security for service compositions
Web services are ubiquitous technologies which are used for integrating business processes and services. As is the case in many other applications, the information processed in we...
Sabina Rossi, Damiano Macedonio
211
Voted
POPL
2006
ACM
16 years 2 months ago
A logic for information flow in object-oriented programs
This paper specifies, via a Hoare-like logic, an interprocedural and flow sensitive (but termination insensitive) information flow analysis for object-oriented programs. Pointer a...
Torben Amtoft, Sruthi Bandhakavi, Anindya Banerjee
127
Voted
CCS
2006
ACM
15 years 6 months ago
Secure information flow with random assignment and encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables classified as H to variables classified as L. In this work we extend such...
Geoffrey Smith
158
Voted
CCS
2010
ACM
15 years 2 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...
100
Voted
IFIP
2009
Springer
15 years 9 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii