Sciweavers

429 search results - page 6 / 86
» Compositionality of Secure Information Flow
Sort
View
171
Voted
JCS
2008
124views more  JCS 2008»
15 years 3 months ago
Securing information flow via dynamic capture of dependencies
Although static systems for information flow security are well-studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct adv...
Paritosh Shroff, Scott F. Smith, Mark Thober
CCS
2008
ACM
15 years 5 months ago
Trust management for secure information flows
Mudhakar Srivatsa, Shane Balfe, Kenneth G. Paterso...
WISTP
2007
Springer
15 years 10 months ago
An Information Flow Verifier for Small Embedded Systems
Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-...
118
Voted
CRISIS
2008
15 years 5 months ago
Policy-based intrusion detection in Web applications by monitoring Java information flows
Guillaume Hiet, Valérie Viet Triem Tong, Lu...
82
Voted
ACJ
2006
47views more  ACJ 2006»
15 years 3 months ago
Securing UML Information Flow Using FlowUML
Khaled Alghathbar, Csilla Farkas, Duminda Wijeseke...