This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
In this paper, we describe a novel approach to policy-based intrusion detection. The model we propose checks legality of information flows between objects in the system, according...
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
This article describes how control theory has been used to address the question of how to size the buffers in core Internet routers. Control theory aims to predict whether the net...
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...