Sciweavers

12 search results - page 2 / 3
» Complete, Safe Information Flow with Decentralized Labels
Sort
View
ACSAC
2001
IEEE
13 years 8 months ago
Information Flow Analysis of Component-Structured Applications
Software component technology facilitates the costeffective development of specialized applications. Nevertheless, due to the high number of principals involved in a component-str...
Peter Herrmann
ACSAC
2007
IEEE
13 years 11 months ago
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
Deepak Chandra, Michael Franz
EUROSYS
2008
ACM
14 years 1 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
PLDI
2006
ACM
13 years 10 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
SRDS
2000
IEEE
13 years 9 months ago
Performance of Mobile, Single-Object, Replication Protocols
This paper discusses the implementation and performance of bounded voting: a new object replication protocol designed for use in mobile and weakly-connected environments. We show ...
Ugur Çetintemel, Peter J. Keleher