Sciweavers

549 search results - page 39 / 110
» Verification condition generation for conditional informatio...
Sort
View
CSFW
2008
IEEE
15 years 2 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers
ESORICS
2008
Springer
15 years 2 months ago
Termination-Insensitive Noninterference Leaks More Than Just a Bit
Current tools for analysing information flow in programs build upon ideas going back to Denning's work from the 70's. These systems enforce an imperfect notion of informa...
Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, D...
DBSEC
2006
115views Database» more  DBSEC 2006»
15 years 2 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
DCC
2007
IEEE
16 years 5 days ago
A Stochastic Model for Video and its Information Rates
We propose a stochastic model for video and compute its information rates. The model has two sources of information representing ensembles of camera motion and visual scene data (...
Arthur L. da Cunha, Minh N. Do, Martin Vetterli
74
Voted
ICASSP
2008
IEEE
15 years 7 months ago
Cryptographic measures in information hiding
Recent information hiding schemes are scrutinized in terms of their cryptographic performance. We establish conditions under which the key equivocation function is optimal for the...
Phillip A. Regalia