Sciweavers

14 search results - page 2 / 3
» Lenient Array Operations for Practical Secure Information Fl...
Sort
View
SIGADA
2004
Springer
13 years 11 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
EUC
2005
Springer
13 years 11 months ago
Ubiquitous Organizational Information Service Framework for Large Scale Intelligent Environments
In this paper, we introduce a concrete, practical Ubiquitous Organizational Information (UOI) service framework, providing novice users intelligent and useful services with respect...
Kwang-il Hwang, Won-Hee Lee, Seok-hwan Kim, Doo Se...
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 3 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
CCS
2008
ACM
13 years 7 months ago
Avoiding timing channels in fixed-priority schedulers
A practically feasible modification to fixed-priority schedulers allows to avoid timing channels despite threads having access to precise clocks. This modification is rather simpl...
Marcus Völp, Claude-Joachim Hamann, Hermann H...
EUROSYS
2009
ACM
14 years 2 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos