„Information-flow Security“
Suchergebnisse
1.000+ Treffer
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIX
-
Security validation of VP-based SoCs using dynamic information flow tracking
-
Providing security on demand using invasive computing
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems LII
-
Systematic Approaches to Advanced Information Flow Analysis – and Applications to Software Security
-
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements
-
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements
-
Systematic Approaches to Advanced Information Flow Analysis – and Applications to Software Security
-
Security through safety – an approach to information flow control based on derivation of safety properties from a characterisation of insecure behaviour
-
Information flows to support software developers in using security APIs
-
Timing Sensitive Dependency Analysis and its Application to Software Security
-
Combining Static and Dynamic Program Analysis Techniques for Checking Relational Properties
-
Information flow control for java – a comprehensive approach based on path conditions in dependence Graphs
-
Gradual security typing
-
Security and Trust Architectures for Protecting Sensitive Data on Commodity Computing Platforms
-
Security via Noninterference - Analyzing Information Flows
-
Information Flow Security in Tree-Manipulating Processes
-
Information flow analysis for mobile code in dynamic security environments
-
Provable Protection of Confidential Data in Microkernel-Based Systems
-
A uniform framework for the formal specification and verification of information flow security