Sciweavers

ESOP
2007
Springer
14 years 3 months ago
A Certified Lightweight Non-interference Java Bytecode Verifier
Non-interference is a semantical condition on programs that guarantees the absence of illicit information flow throughout their execution, and that can be enforced by appropriate i...
Gilles Barthe, David Pichardie, Tamara Rezk
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
14 years 3 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
SP
1990
IEEE
14 years 3 months ago
Probabilistic Interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
James W. Gray III
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
14 years 3 months ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov
HICSS
2002
IEEE
139views Biometrics» more  HICSS 2002»
14 years 4 months ago
Examining Quality of Care -- How Poor Information Flow Can Impact on Hospital Workflow and Affect Patient Outcomes
This paper argues that effective management of patient image data can enhance patient care. It examines the workflow and information flows involved in the search for image based d...
Reeva M. Lederman, Iain Morrison
CIKM
2005
Springer
14 years 5 months ago
Query expansion using term relationships in language models for information retrieval
Language Modeling (LM) has been successfully applied to Information Retrieval (IR). However, most of the existing LM approaches only rely on term occurrences in documents, queries...
Jing Bai, Dawei Song, Peter Bruza, Jian-Yun Nie, G...
ICDCSW
2005
IEEE
14 years 5 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
SIGIR
2006
ACM
14 years 5 months ago
Personalized recommendation driven by information flow
We propose that the information access behavior of a group of people can be modeled as an information flow issue, in which people intentionally or unintentionally influence and in...
Xiaodan Song, Belle L. Tseng, Ching-Yung Lin, Ming...