Sciweavers

SE
2010
13 years 6 months ago
Towards Information Flow Auditing in Workflows
: The paper proposes an approach for compliance audits in workflow environments based on the tracking of information flow. Requirements are formalized as a binary relation on the w...
Claus Wonnemann
ERSHOV
2006
Springer
13 years 6 months ago
Security for Multithreaded Programs Under Cooperative Scheduling
Abstract. Information flow exhibited by multithreaded programs is subtle because the attacker may exploit scheduler properties when deducing secret information from publicly observ...
Alejandro Russo, Andrei Sabelfeld
CCS
2008
ACM
13 years 6 months ago
SOMA: mutual approval for included content in web pages
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...
WSC
2007
13 years 6 months ago
Communication and process simulation of set-based design for concrete reinforcement
Two discrete-event simulations are developed to assess the feasibility of improving the delivery process of reinforced concrete structures. The simulations represent the resource ...
John-Michael Wong, Kristen Parrish, Iris D. Tommel...
ASIAN
2003
Springer
126views Algorithms» more  ASIAN 2003»
13 years 8 months ago
Information Flow Security for XML Transformations
Abstract. We provide a formal definition of information flows in XML transformations and, more generally, in the presence of type driven computations and describe a sound technique...
Véronique Benzaken, Marwan Burelle, Giusepp...
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
13 years 8 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
CSFW
2007
IEEE
13 years 8 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
DSOM
2000
Springer
13 years 9 months ago
Middleware Platform Management Based on Portable Interceptors
Abstract. Object middleware is an enabling technology for distributed applications that are required to operate in heterogeneous computing and communication environments. Although ...
Olaf Kath, Aart van Halteren, Frank Stoinski, Maar...
PROFES
2007
Springer
13 years 10 months ago
Improving an Industrial Reference Process by Information Flow Analysis: A Case Study
Reference processes are supposed to be the basis for collaboration and mature cooperation in software development. Large business organizations need large and diverse reference pro...
Kai Stapel, Kurt Schneider, Daniel Lübke, Tho...