Sciweavers

1795 search results - page 36 / 359
» Security Models and Information Flow
Sort
View
ESORICS
2011
Springer
13 years 11 months ago
Automated Information Flow Analysis of Virtualized Infrastructures
The use of server virtualization has been growing steadily, but many enterprises still are reluctant to migrate critical workloads to such infrastructures. One key inhibitor is the...
Sören Bleikertz, Thomas Groß, Matthias ...
IFIP
2009
Springer
15 years 6 months ago
Analysing the Information Flow Properties of Object-Capability Patterns
We consider the problem of detecting covert channels within security-enforcing object-capability patterns. Traditional formalisms for reasoning about the security properties of obj...
Toby C. Murray, Gavin Lowe
81
Voted
SIGSOFT
2008
ACM
16 years 16 days ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
ICPR
2004
IEEE
16 years 27 days ago
Evaluation of Three Optical Flow-Based Observation Models for Tracking
In this paper, we study the use of optical flow as a characteristic for tracking. We analyze the behavior of three flowbased observation models for particle filter algorithms, and...
José M. Fuertes, Manuel J. Lucena, Nicolas ...
CRITIS
2007
15 years 1 months ago
Modeling and Simulating Information Security Management
Security Management is a complex task. It requires several interconnected activities: designing, implementing and maintaining a robust technical infrastructure, developing suitable...
Jose Maria Sarriegi, Javier Santos, Jose M. Torres...