Sciweavers

6812 search results - page 53 / 1363
» Detection of Information Flows
Sort
View
CSFW
2004
IEEE
15 years 5 months ago
Modelling Downgrading in Information Flow Security
Information flow security properties such as noninterference ensure the protection of confidential data by strongly limiting the flow of sensitive information. However, to deal wi...
Annalisa Bossi, Carla Piazza, Sabina Rossi
JTAER
2008
116views more  JTAER 2008»
15 years 26 days ago
Disruptions in Information Flow: A Revenue Costing Supply Chain Dilemma
The integration of supply chains as a mechanism for value creation is largely dependent on continuous flow of real time accurate information from the customer back upstream to the...
Albert Munoz, Michael D. Clements
ISQED
2003
IEEE
133views Hardware» more  ISQED 2003»
15 years 6 months ago
Impact of Interconnect Pattern Density Information on a 90nm Technology ASIC Design Flow
The importance of an interconnect pattern density model in ASIC design flow for a 90nm technology is presented. It is shown that performing the timing analysis at the worst-case c...
Payman Zarkesh-Ha, S. Lakshminarayann, Ken Doniger...
OSDI
2006
ACM
16 years 1 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...
FM
2009
Springer
104views Formal Methods» more  FM 2009»
15 years 8 months ago
Verifying Information Flow Control over Unbounded Processes
Abstract. Decentralized Information Flow Control (DIFC) systems enable programmers to express a desired DIFC policy, and to have the policy enforced via a reference monitor that re...
William R. Harris, Nicholas Kidd, Sagar Chaki, Som...