Sciweavers

329 search results - page 13 / 66
» A Theory of Secure Control Flow
Sort
View
SACMAT
2006
ACM
15 years 3 months ago
Information flow property preserving transformation of UML interaction diagrams
We present an approach for secure information flow property preserving refinement and transformation of UML inspired interaction diagrams. The approach is formally underpinned b...
Fredrik Seehusen, Ketil Stølen
FROCOS
2007
Springer
15 years 3 months ago
Combining Algorithms for Deciding Knowledge in Security Protocols
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Mathilde Arnaud, Véronique Cortier, St&eacu...
EUC
2005
Springer
15 years 3 months ago
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow
Abstract. For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protec...
Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakura...
ESOP
2000
Springer
15 years 1 months ago
Secure Information Flow as Typed Process Behaviour
Abstract. We propose a new type discipline for the -calculus in which secure information flow is guaranteed by static type checking. Secrecy levels are assigned to channels and are...
Kohei Honda, Vasco Thudichum Vasconcelos, Nobuko Y...
INFOCOM
1999
IEEE
15 years 1 months ago
A Model for Window Based Flow Control in Packet-Switched Networks
Recently, networks have increased rapidly both in scale and speed. Problems related to the control and management are of increasing interest. The average throughput and end-to-end ...
Xiaowei Yang