Sciweavers

1477 search results - page 117 / 296
» Token flow control
Sort
View
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 7 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
CSFW
2004
IEEE
15 years 7 months ago
Enforcing Robust Declassification
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems perform intentional release of sensitive informat...
Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
ISDO
2000
150views Business» more  ISDO 2000»
15 years 5 months ago
Business-to-Business E-Commerce in a Logistics Domain
Today companies outsource part of the service provisioning to other companies that are not part of their core competence. Companies can use current workflow management systems to ...
Zef Damen, Wijnand Derks, Matthijs Duitshof, Henk ...
272
Voted
SIGCOMM
2012
ACM
13 years 6 months ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Configuration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...
DBSEC
2006
115views Database» more  DBSEC 2006»
15 years 5 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera