Sciweavers

211 search results - page 31 / 43
» Securing UML Information Flow Using FlowUML
Sort
View
ACSAC
2000
IEEE
15 years 2 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
DSN
2007
IEEE
15 years 1 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
96
Voted
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
14 years 9 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
CJ
2004
105views more  CJ 2004»
14 years 9 months ago
Generalized Template Splay: A Basic Theory and Calculus
act interpretation. R. Barbuti, C. Bernardeschi and N. De Francesco With mobile technology more and more prominent, the problem of security leakages becomes more and more important...
George F. Georgakopoulos, David J. McClurkin
CSFW
2008
IEEE
14 years 11 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers