Sciweavers

848 search results - page 65 / 170
» Secure Information Flow for Distributed Systems
Sort
View
CCS
2009
ACM
15 years 6 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
USS
2004
15 years 1 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...
CCS
2007
ACM
15 years 6 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
TACAS
2010
Springer
137views Algorithms» more  TACAS 2010»
15 years 6 months ago
Statistical Measurement of Information Leakage
Information theory provides a range of useful methods to analyse probability distributions and these techniques have been successfully applied to measure information flow and the ...
Konstantinos Chatzikokolakis, Tom Chothia, Apratim...
NOMS
2002
IEEE
131views Communications» more  NOMS 2002»
15 years 4 months ago
Tools for domain-based policy management of distributed systems
The management of policies in large-scale systems is complex because of the potentially large number of policies and administrators, as well as the diverse types of information th...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...