Sciweavers

6812 search results - page 16 / 1363
» Detection of Information Flows
Sort
View
VEE
2012
ACM
252views Virtualization» more  VEE 2012»
13 years 5 months ago
libdft: practical dynamic data flow tracking for commodity systems
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they propagate during program execution. DFT has been repeatedly implemented by a variety of ...
Vasileios P. Kemerlis, Georgios Portokalidis, Kang...
IWIA
2005
IEEE
15 years 3 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
ICCV
2005
IEEE
15 years 11 months ago
Detecting Rotational Symmetries
We present an algorithm for detecting multiple rotational symmetries in natural images. Given an image, its gradient magnitude field is computed, and information from the gradient...
V. Shiv Naga Prasad, Larry S. Davis
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
15 years 2 months ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov
FM
2008
Springer
130views Formal Methods» more  FM 2008»
14 years 11 months ago
Specification and Checking of Software Contracts for Conditional Information Flow
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
Torben Amtoft, John Hatcliff, Edwin Rodrígu...