Sciweavers

243 search results - page 17 / 49
» Exception-Based Information Flow Control in Object-Oriented ...
Sort
View
JCS
2006
118views more  JCS 2006»
14 years 9 months ago
Enforcing Robust Declassification and Qualified Robustness
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems release sensitive information as part of their in...
Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
14 years 7 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...
LISP
2002
81views more  LISP 2002»
14 years 9 months ago
Secure Information Flow via Linear Continuations
Security-typed languages enforce secrecy or integrity policies by type-checking. This paper investigates continuation-passing style (CPS) as a means of proving that such languages...
Steve Zdancewic, Andrew C. Myers
SMALLTALK
2007
Springer
15 years 3 months ago
Object flow analysis: taking an object-centric view on dynamic analysis
To extract abstract views of the behavior of an object-oriented system for reverse engineering, a body of research exists that analyzes a system’s runtime execution. Those approa...
Adrian Lienhard, Stéphane Ducasse, Tudor G&...
ICUMT
2009
14 years 7 months ago
Adaptive resource control in 2-hop ad-hoc networks
This paper presents a simple resource control mechanism with traffic scheduling for 2-hop ad-hoc networks, in which the Request-To-Send (RTS) packet is utilized to deliver feedback...
Yimeng Yang, Geert J. Heijenk, Boudewijn R. Haverk...