Sciweavers

329 search results - page 22 / 66
» A Theory of Secure Control Flow
Sort
View
SACMAT
2011
ACM
14 years 2 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
CCS
2005
ACM
15 years 5 months ago
Control-flow integrity
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
Martín Abadi, Mihai Budiu, Úlfar Erl...
XMLSEC
2003
ACM
15 years 5 months ago
A bitmap-based access control for restricted views of XML documents
The information on the web is growing at a very fast pace. In this ever-accumulating data, the volume of information represented in XML format is on the rise in recent times. An o...
Abhilash Gummadi, Jong P. Yoon, Biren Shah, Vijay ...
BPSC
2009
190views Business» more  BPSC 2009»
15 years 27 days ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
IC
2004
15 years 1 months ago
Controlling Inbound Traffic
This work considers the problem of prioritizing the inbound TCP traffic of an organization network. The objective is to allocate dynamically a specific share of the incoming link ...
Saad Biaz