A promising technique for protecting privacy and integrity of sensitive data is to statically check information flow within programs that manipulate the data. While previous work...
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
—A general framework is developed for networks with flows that use all available congestion signals to regulate their rates. It is conceptually a generalization of the existing ...
Abstract. For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protec...
In a research and technology applicationproject at Bellcore, we used multidatabase transactions to model multisystem workflows of telecommunication applications. During the projec...
W. Woody Jin, Marek Rusinkiewicz, Linda Ness, Amit...