Sciweavers

1795 search results - page 9 / 359
» Security Models and Information Flow
Sort
View
116
Voted
JCS
2008
124views more  JCS 2008»
14 years 11 months ago
Securing information flow via dynamic capture of dependencies
Although static systems for information flow security are well-studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct adv...
Paritosh Shroff, Scott F. Smith, Mark Thober