Sciweavers

315 search results - page 4 / 63
» Arrows for secure information flow
Sort
View
66
Voted
CSFW
2010
IEEE
15 years 24 days ago
Quantitative Information Flow - Verification Hardness and Possibilities
Hirotoshi Yasuoka, Tachio Terauchi
JCS
2008
124views more  JCS 2008»
14 years 9 months ago
Securing information flow via dynamic capture of dependencies
Although static systems for information flow security are well-studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct adv...
Paritosh Shroff, Scott F. Smith, Mark Thober
HASKELL
2008
ACM
14 years 10 months ago
A library for light-weight information-flow security in haskell
Protecting confidentiality of data has become increasingly important for computing systems. Information-flow techniques have been developed over the years to achieve that purpos...
Alejandro Russo, Koen Claessen, John Hughes
CCS
2008
ACM
14 years 11 months ago
Trust management for secure information flows
Mudhakar Srivatsa, Shane Balfe, Kenneth G. Paterso...
WISTP
2007
Springer
15 years 3 months ago
An Information Flow Verifier for Small Embedded Systems
Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-...