Sciweavers

311 search results - page 6 / 63
» Secure Information Flow by Self-Composition
Sort
View
ACJ
2006
47views more  ACJ 2006»
15 years 1 months ago
Securing UML Information Flow Using FlowUML
Khaled Alghathbar, Csilla Farkas, Duminda Wijeseke...
ASIAN
2003
Springer
126views Algorithms» more  ASIAN 2003»
15 years 5 months ago
Information Flow Security for XML Transformations
Abstract. We provide a formal definition of information flows in XML transformations and, more generally, in the presence of type driven computations and describe a sound technique...
Véronique Benzaken, Marwan Burelle, Giusepp...
ACSAC
2010
IEEE
14 years 11 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
97
Voted
ACSC
2006
IEEE
15 years 5 months ago
Tracing secure information flow through mode changes
Communications devices intended for use in securitycritical applications must be rigorously evaluated to ensure they preserve data confidentiality. This process includes tracing t...
Colin J. Fidge, Tim McComb