Sciweavers

1183 search results - page 111 / 237
» On flow-sensitive security types
Sort
View
CCS
2007
ACM
15 years 10 months ago
Yet another MicroArchitectural Attack: : exploiting I-Cache
Abstract. MicroArchitectural Attacks (MA), which can be considered as a special form of SideChannel Analysis, exploit microarchitectural functionalities of processor implementation...
Onur Aciiçmez
CSFW
2006
IEEE
15 years 10 months ago
Noninterference in the Presence of Non-Opaque Pointers
A common theoretical assumption in the study of information flow security in Java-like languages is that pointers are opaque – i.e., that the only properties that can be observ...
Daniel Hedin, David Sands
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
15 years 10 months ago
A Decentralized Key Management Scheme in Overlay Multicast Network
The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time st...
Xingfeng Guo, Xiaodong Liu, Qionghai Dai
ICTCS
2005
Springer
15 years 10 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
SPW
2001
Springer
15 years 9 months ago
On the Negotiation of Access Control Policies
Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only n...
Virgil D. Gligor, Himanshu Khurana, Radostina K. K...