Sciweavers

TSE
2010
120views more  TSE 2010»
13 years 2 months ago
Time and Probability-Based Information Flow Analysis
Abstract—In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial stud...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...
IFIPTM
2010
97views Management» more  IFIPTM 2010»
13 years 2 months ago
Securing Class Initialization
Abstract. Language-based information-flow security is concerned with specifying and enforcing security policies for information flow via language constructs. Although much progre...
Keiko Nakata, Andrei Sabelfeld
IJNSEC
2007
142views more  IJNSEC 2007»
13 years 4 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...
IJISEC
2007
149views more  IJISEC 2007»
13 years 4 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
CONTEXT
2005
Springer
13 years 6 months ago
Minimality and Non-determinism in Multi-context Systems
Multi-context systems can be used to represent contextual information and inter-contextual information flow. We show that the local model semantics of a multi-context system is co...
Floris Roelofsen, Luciano Serafini
AAAI
2007
13 years 6 months ago
Equilibria in Heterogeneous Nonmonotonic Multi-Context Systems
We propose a general framework for multi-context reasoning which allows us to combine arbitrary monotonic and nonmonotonic logics. Nonmonotonic bridge rules are used to specify th...
Gerhard Brewka, Thomas Eiter
CSFW
1995
IEEE
13 years 7 months ago
Composing and decomposing systems under security properties
We investigate the formal relationship between separability of processes and the types of non-interference properties they enjoy. Though intuitively appealing, separability – th...
A. W. Roscoe, L. Wulf
CSFW
2010
IEEE
13 years 8 months ago
Information Flow in Credential Systems
—This paper proposes a systematic study of information flow in credential-based declarative authorization policies. It argues that a treatment in terms of information flow is n...
Moritz Y. Becker
VMCAI
2005
Springer
13 years 9 months ago
Information Flow Analysis for Java Bytecode
Abstract. We present a context-sensitive compositional analysis of information flow for full (mono-threaded) Java bytecode. Our idea consists in transforming the Java bytecode int...
Samir Genaim, Fausto Spoto
IFIP
2005
Springer
13 years 9 months ago
Opacity Generalised to Transition Systems
Recently, opacity has proved to be a promising technique for describing security properties. Much of the work has been couched in terms of Petri nets. Here, we extend the notion of...
Jeremy Bryans, Maciej Koutny, Laurent Mazaré...