Sciweavers

429 search results - page 21 / 86
» Compositionality of Secure Information Flow
Sort
View
56
Voted
MPC
1998
Springer
81views Mathematics» more  MPC 1998»
15 years 1 months ago
A Semantic Approach to Secure Information Flow
K. Rustan M. Leino, Rajeev Joshi
ICDCSW
2000
IEEE
15 years 1 months ago
Secure Information Flow in Mobile Bootstrapping Process
Zhaoyu Liu, M. Dennis Mickunas, Roy H. Campbell
ESORICS
2010
Springer
14 years 9 months ago
Flexible Scheduler-Independent Security
Abstract We propose an approach to certify the information flow security of multi-threaded programs independently from the scheduling algorithm. A scheduler-independent verificatio...
Heiko Mantel, Henning Sudbrock
ATVA
2010
Springer
163views Hardware» more  ATVA 2010»
14 years 10 months ago
Automatic Generation of History-Based Access Control from Information Flow Specification
This paper proposes a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-b...
Yoshiaki Takata, Hiroyuki Seki