Sciweavers

158
Voted
TAMC
2010
Springer
15 years 9 months ago
Binary De Bruijn Partial Words with One Hole
In this paper, we investigate partial words, or finite sequences that may have some undefined positions called holes, of maximum subword complexity. The subword complexity functi...
Francine Blanchet-Sadri, Jarett Schwartz, Slater S...
CSFW
2007
IEEE
15 years 9 months ago
Secure information flow and program logics
We present interpretations of type systems for secure information flow in Hoare logic, complementing previous encodings in binary (e.g. relational) program logics. Treating base-l...
Lennart Beringer, Martin Hofmann
CSFW
2007
IEEE
15 years 9 months ago
A Type Discipline for Authorization in Distributed Systems
We consider the problem of statically verifying the conformance of the code of a system to an explicit authorization policy. In a distributed setting, some part of the system may ...
Cédric Fournet, Andy Gordon, Sergio Maffeis
CSFW
2007
IEEE
15 years 9 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
238
Voted
SWAT
2010
Springer
332views Algorithms» more  SWAT 2010»
15 years 9 months ago
Improved Methods For Generating Quasi-gray Codes
Prosenjit Bose, Paz Carmi, Dana Jansens, Anil Mahe...