Sciweavers

6293 search results - page 305 / 1259
» Information Flow Testing
Sort
View
CAU
2004
192views Cryptology» more  CAU 2004»
15 years 6 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
LISA
2004
15 years 6 months ago
Meta Change Queue: Tracking Changes to People, Places, and Things
Managing information flow between different parts of the enterprise information infrastructure can be a daunting task. We have grown too large to send the complete lists around an...
Jon Finke
ESORICS
2008
Springer
15 years 6 months ago
Termination-Insensitive Noninterference Leaks More Than Just a Bit
Current tools for analysing information flow in programs build upon ideas going back to Denning's work from the 70's. These systems enforce an imperfect notion of informa...
Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, D...
POPL
2006
ACM
16 years 5 months ago
On flow-sensitive security types
This article investigates formal properties of a family of semantically sound flow-sensitive type systems for tracking information flow in simple While programs. The family is ind...
Sebastian Hunt, David Sands
RECOMB
2003
Springer
16 years 5 months ago
Accurate detection of very sparse sequence motifs
Protein sequence alignments are more reliable the shorter the evolutionary distance. Here, we align distantly related proteins using many closely spaced intermediate sequences as ...
Andreas Heger, Michael Lappe, Liisa Holm