Sciweavers

315 search results - page 6 / 63
» Arrows for secure information flow
Sort
View
ACSC
2006
IEEE
15 years 1 months ago
Tracing secure information flow through mode changes
Communications devices intended for use in securitycritical applications must be rigorously evaluated to ensure they preserve data confidentiality. This process includes tracing t...
Colin J. Fidge, Tim McComb
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
15 years 1 months ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov
91
Voted
ACMSE
2006
ACM
15 years 3 months ago
Type inference and informative error reporting for secure information flow
If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Zhenyue Deng, Geoffrey Smith
64
Voted
SFM
2010
Springer
202views Formal Methods» more  SFM 2010»
15 years 1 months ago
Information Theory and Security: Quantitative Information Flow
Pasquale Malacaria, Jonathan Heusser
CCS
2010
ACM
14 years 9 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...