Sciweavers

2144 search results - page 107 / 429
» Exact Flow Analysis
Sort
View
IFIP
2009
Springer
15 years 10 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii
CC
2007
Springer
15 years 10 months ago
Correcting the Dynamic Call Graph Using Control-Flow Constraints
Abstract. To reason about programs, dynamic optimizers and analysis tools use sampling to collect a dynamic call graph (DCG). However, sampling has not achieved high accuracy with ...
Byeongcheol Lee, Kevin Resnick, Michael D. Bond, K...
ACMSE
2006
ACM
15 years 10 months ago
Type inference and informative error reporting for secure information flow
If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Zhenyue Deng, Geoffrey Smith
CSFW
2003
IEEE
15 years 9 months ago
Using Access Control for Secure Information Flow in a Java-like Language
Access control mechanisms are widely used with the intent of enforcing confidentiality and other policies, but few formal connections have been made between information flow and...
Anindya Banerjee, David A. Naumann
INFOCOM
2003
IEEE
15 years 9 months ago
Stability and Convergence of TCP-like Congestion Controllers in a Many-Flows Regime
— With the rapid growth of Internet, parameter design and analysis for large-scale networks has become a topic of active interest. Since simulation of such large scale systems is...
Supratim Deb, Sanjay Shakkottai, R. Srikant