Sciweavers

95 search results - page 11 / 19
» The Complexity of Synchronous Notions of Information Flow Se...
Sort
View
UTP
2010
13 years 6 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
IPL
2007
72views more  IPL 2007»
13 years 8 months ago
How to safely close a discussion
In the secure communication problem, we focus on safe termination. In applications such as electronic transactions, we want each party to be ensured that both sides agree on the s...
Gildas Avoine, Serge Vaudenay
ESORICS
2008
Springer
13 years 10 months ago
Termination-Insensitive Noninterference Leaks More Than Just a Bit
Current tools for analysing information flow in programs build upon ideas going back to Denning's work from the 70's. These systems enforce an imperfect notion of informa...
Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, D...
JIIS
2007
92views more  JIIS 2007»
13 years 8 months ago
Information ecology: open system environment for data, memories, and knowing
An information ecology provides a conceptual framework to consider data, the creation of knowledge, and the flow of information within a multidimensional context. This paper, repor...
Karen S. Baker, Geoffrey C. Bowker
DBSEC
2009
124views Database» more  DBSEC 2009»
13 years 9 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn