Sciweavers

243 search results - page 17 / 49
» Exception-Based Information Flow Control in Object-Oriented ...
Sort
View
JCS
2006
118views more  JCS 2006»
15 years 1 months ago
Enforcing Robust Declassification and Qualified Robustness
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems release sensitive information as part of their in...
Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
14 years 11 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...
LISP
2002
81views more  LISP 2002»
15 years 1 months ago
Secure Information Flow via Linear Continuations
Security-typed languages enforce secrecy or integrity policies by type-checking. This paper investigates continuation-passing style (CPS) as a means of proving that such languages...
Steve Zdancewic, Andrew C. Myers
SMALLTALK
2007
Springer
15 years 8 months ago
Object flow analysis: taking an object-centric view on dynamic analysis
To extract abstract views of the behavior of an object-oriented system for reverse engineering, a body of research exists that analyzes a system’s runtime execution. Those approa...
Adrian Lienhard, Stéphane Ducasse, Tudor G&...
ICUMT
2009
14 years 11 months ago
Adaptive resource control in 2-hop ad-hoc networks
This paper presents a simple resource control mechanism with traffic scheduling for 2-hop ad-hoc networks, in which the Request-To-Send (RTS) packet is utilized to deliver feedback...
Yimeng Yang, Geert J. Heijenk, Boudewijn R. Haverk...