Sciweavers

329 search results - page 4 / 66
» A Theory of Secure Control Flow
Sort
View
83
Voted
CSFW
2005
IEEE
15 years 3 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
ESORICS
2003
Springer
15 years 2 months ago
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection
In this paper, we describe a novel approach to policy-based intrusion detection. The model we propose checks legality of information flows between objects in the system, according...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
15 years 1 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
CCR
2005
103views more  CCR 2005»
14 years 9 months ago
Part II: control theory for buffer sizing
This article describes how control theory has been used to address the question of how to size the buffers in core Internet routers. Control theory aims to predict whether the net...
Gaurav Raina, Donald F. Towsley, Damon Wischik
ICDCSW
2005
IEEE
15 years 3 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob