Sciweavers

235 search results - page 9 / 47
» Trust management for secure information flows
Sort
View
DAC
2007
ACM
13 years 11 months ago
Trusted Design in FPGAs
Using FPGAs, a designer can separate the design process from the manufacturing flow. Therefore, the owner of a sensitive design need not expose the design to possible theft and ta...
Steven Trimberger
PERCOM
2006
ACM
14 years 7 months ago
Developing a Model for Trust Management in Pervasive Devices
Pervasive devices interacting in open and dynamic spaces with each others require a mechanism that allows them acting autonomously in a secure way and protecting their resources. ...
Andrés Marín López, Daniel Di...
SACMAT
2006
ACM
14 years 1 months ago
Information flow property preserving transformation of UML interaction diagrams
We present an approach for secure information flow property preserving refinement and transformation of UML inspired interaction diagrams. The approach is formally underpinned b...
Fredrik Seehusen, Ketil Stølen
ACSAC
1998
IEEE
13 years 12 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
PLDI
2006
ACM
14 years 1 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober