Sciweavers

848 search results - page 26 / 170
» Secure Information Flow for Distributed Systems
Sort
View
DIAU
2000
Springer
15 years 4 months ago
Freenet: A Distributed Anonymous Information Storage and Retrieval System
We describe Freenet, a peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers...
Ian Clarke, Oskar Sandberg, Brandon Wiley, Theodor...
83
Voted
KBSE
2007
IEEE
15 years 6 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
15 years 4 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
CASSIS
2005
Springer
15 years 5 months ago
Information Flow Analysis for a Typed Assembly Language with Polymorphic Stacks
Abstract. We study secure information flow in a stack based Typed Assembly Language (TAL). We define a TAL with an execution stack and establish the soundness of its type system ...
Eduardo Bonelli, Adriana B. Compagnoni, Ricardo Me...
151
Voted
INFOCOM
2009
IEEE
15 years 6 months ago
Locally vs. Globally Optimized Flow-Based Content Distribution to Mobile Nodes
—The paper deals with efficient distribution of timely information to flows of mobile devices. We consider the case where a set of Information Dissemination Devices (IDDs) broa...
Mhameed Aezladen, Reuven Cohen, Danny Raz