Sciweavers

2335 search results - page 31 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
ESORICS
2010
Springer
15 years 1 months ago
Flexible Scheduler-Independent Security
Abstract We propose an approach to certify the information flow security of multi-threaded programs independently from the scheduling algorithm. A scheduler-independent verificatio...
Heiko Mantel, Henning Sudbrock
IJNSEC
2007
142views more  IJNSEC 2007»
15 years 1 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...
HPCA
2006
IEEE
16 years 1 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
CRITIS
2008
15 years 3 months ago
Testbeds for Assessing Critical Scenarios in Power Control Systems
Abstract. The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility Infrastructur...
Giovanna Dondossola, Geert Deconinck, Fabrizio Gar...
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
14 years 11 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...