Type systems for secure information flow aim to prevent a program from leaking information from variables classified as H to variables classified as L. In this work we extend such...
Abstract— Mobile ad hoc networks often support sensitive applications. These applications may require that users’ identity, location, and correspondents be kept secret. This is...
Heesook Choi, Patrick Drew McDaniel, Thomas F. La ...
The idea of using user preferences to assist with information filtering and with providing the most “relevant” answers to queries has recently received some attention from th...
The specific organization used by a multi-agent system is crucial for its effectiveness and efficiency. In dynamic environments, or when the objectives of the system shift, the ...
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...