Sciweavers

211 search results - page 21 / 43
» Securing UML Information Flow Using FlowUML
Sort
View
139
Voted
WWW
2004
ACM
16 years 2 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
113
Voted
ESORICS
2004
Springer
15 years 5 months ago
Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage
Abstract. We revisit the classical notion of noninterference for statebased systems, as presented by Rushby in 1992. We strengthen his results in several ways, in particular clarif...
David von Oheimb
106
Voted
CSFW
2010
IEEE
15 years 5 months ago
Information Flow in Credential Systems
—This paper proposes a systematic study of information flow in credential-based declarative authorization policies. It argues that a treatment in terms of information flow is n...
Moritz Y. Becker
POPL
2006
ACM
16 years 2 months ago
On flow-sensitive security types
This article investigates formal properties of a family of semantically sound flow-sensitive type systems for tracking information flow in simple While programs. The family is ind...
Sebastian Hunt, David Sands
CAISE
2003
Springer
15 years 5 months ago
A Specification Approach to Compose Mobile Web Services Using Service Chart Diagrams
We present our work on composing mobile Web services, denoted by M-services, in the wireless world. The wireless world has its own features that make it completely different from t...
Zakaria Maamar, Mohammed Lahkim