Sciweavers

58 search results - page 3 / 12
» Secure Information Flow via Linear Continuations
Sort
View
IFIP
2009
Springer
13 years 10 months ago
Secure Information Flow for Distributed Systems
We present an abstract language for distributed systems of processes with local memory and private communication channels. Communication between processes is done via messaging. Th...
Rafael Alpízar, Geoffrey Smith
ESOP
2001
Springer
13 years 9 months ago
Secure Information Flow and CPS
Security-typed languages enforce confidentiality or integrity policies by type checking. This paper investigates continuation-passing style (CPS) translation of such languages as ...
Steve Zdancewic, Andrew C. Myers
PLDI
2006
ACM
13 years 11 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
IJNSEC
2007
142views more  IJNSEC 2007»
13 years 5 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...
FINTAL
2006
13 years 9 months ago
Incorporating External Information in Bayesian Classifiers Via Linear Feature Transformations
Naive Bayes classifier is a frequently used method in various natural language processing tasks. Inspired by a modified version of the method called the flexible Bayes classifier, ...
Tapio Pahikkala, Jorma Boberg, Aleksandr Myllä...