Sciweavers

311 search results - page 6 / 63
» Secure Information Flow by Self-Composition
Sort
View
75
Voted
CRISIS
2008
14 years 11 months ago
Policy-based intrusion detection in Web applications by monitoring Java information flows
Guillaume Hiet, Valérie Viet Triem Tong, Lu...
ACJ
2006
47views more  ACJ 2006»
14 years 9 months ago
Securing UML Information Flow Using FlowUML
Khaled Alghathbar, Csilla Farkas, Duminda Wijeseke...
73
Voted
ASIAN
2003
Springer
126views Algorithms» more  ASIAN 2003»
15 years 1 months ago
Information Flow Security for XML Transformations
Abstract. We provide a formal definition of information flows in XML transformations and, more generally, in the presence of type driven computations and describe a sound technique...
Véronique Benzaken, Marwan Burelle, Giusepp...
ACSAC
2010
IEEE
14 years 7 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
ACSC
2006
IEEE
15 years 1 months ago
Tracing secure information flow through mode changes
Communications devices intended for use in securitycritical applications must be rigorously evaluated to ensure they preserve data confidentiality. This process includes tracing t...
Colin J. Fidge, Tim McComb