Sciweavers

1440 search results - page 115 / 288
» Third-Party Flow Control
Sort
View
CSFW
2004
IEEE
15 years 8 months ago
Enforcing Robust Declassification
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems perform intentional release of sensitive informat...
Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
ISDO
2000
150views Business» more  ISDO 2000»
15 years 5 months ago
Business-to-Business E-Commerce in a Logistics Domain
Today companies outsource part of the service provisioning to other companies that are not part of their core competence. Companies can use current workflow management systems to ...
Zef Damen, Wijnand Derks, Matthijs Duitshof, Henk ...
DBSEC
2006
115views Database» more  DBSEC 2006»
15 years 5 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
OSDI
2006
ACM
16 years 4 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...
IAT
2007
IEEE
15 years 10 months ago
Comparing Route Selection Strategies in Collaborative Traffic Flow Management
Today’s air traffic management system is not expected to scale to the projected increase in traffic over the next two decades. Enhanced collaboration between the controllers and...
Shawn R. Wolfe, Francis Y. Enomoto, Peter A. Jarvi...