نتایج جستجو برای: information flow control

تعداد نتایج: 2748403  

2000
Christian S. Collberg Sean Davey Todd A. Proebsting

We describe a language-independent and specificationdriven program rendering tool that is able to produce highquality code renderings of arbitrary complexity. The tool can incorporate arbitrary types of information together with the program code, allowing it to be used for debugging and profiling as well as for producing beautiful renderings of programs for publication. We also present a model ...

2003
Claudio Bettini Xiaoyang Sean Wang Sushil Jajodia

Controlled release of information from an organization is becoming important from various considerations: privacy, competitive information protection, strategic data control, and more. In most organizations, data protection is afforded only by using access control. However, it can be argued that access control suffers from at least two problems. First, effective access control assumes a perfect...

1997
Masashi Yasuda Takayuki Tachikawa Makoto Takizawa

In distributed applications, a group of multiple objects are cooperating to achieve some objectives. An object is modeled as a pair of data structure and operations. Each object is manipulated through an operation supported by the object and then the operation may further invoke operations of other objects, i.e. nested operations. The purpose-oriented access rules indicate what operation in eac...

2014
Ruzena Bajcsy

In this paper we present a framework for research into the development of an Active Observer. The components of such an observer are the low and intermediate visual processing modules. Some of these modules have been adapted from the community and some have been investigated in the GRASP laboratory, most notably modules for the understanding of surface reflections via color and multiple views a...

Journal: :First Monday 2010
Andrew M. Odlyzko

Gullibility is the principal cause of bubbles. Investors and the general public get snared by a “beautiful illusion” and throw caution to the wind. Attempts to identify and control bubbles are complicated by the fact that the authorities who might naturally be expected to take action have often (especially in recent years) been among the most gullible, and were cheerleaders for the exuberant be...

Journal: :Artif. Intell. 2001
Roland Hausser

This paper presents a formal ‘fragment’ of database semantics as a declarative model of a cognitive agent. It is called a SLIM machine and functionally integrates the procedures of natural language interpretation, conceptualization, and production as well as query and inference. Each of these functions is illustrated explicitly by a corresponding LA-grammar. In addition, a control structure bas...

Journal: :Inf. Comput. 2008
Chiara Braghin Agostino Cortesi Riccardo Focardi

A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to properly protect their content are explicitly identified as boundaries: a boundary can be seen as a resource access manager for confidential data. In this setting, absence of direct information leakage is granted as soon as ...

2010
Alejandro Russo Andrei Sabelfeld Keqin Li

Information-flow technology is a promising approach for ensuring security by design and construction. When tracking information flow, of particular concern are implicit flows, i.e., flows through control flow when computation branches on secret data and performs publicly observed side effects depending on which branch is taken. The large body of literature exercises two extreme views on implici...

2012
Mariem Graa Nora Cuppens-Boulahia Frédéric Cuppens Ana R. Cavalli

Security in embedded systems such as smartphones requires protection of confidential data and applications. Many of security mechanisms use dynamic taint analysis techniques for tracking information flow in software. But these techniques cannot detect control flows that use conditionals to implicitly transfer information from objects to other objects. In particular, malicious applications can b...

Journal: :CoRR 2012
Ahmad Lashgar Amirali Baniasadi Ahmad Khonsari

There are a number of design decisions that impact a GPU's performance. Among such decisions deciding the right warp size can deeply influence the rest of the design. Small warps reduce the performance penalty associated with branch divergence at the expense of a reduction in memory coalescing. Large warps enhance memory coalescing significantly but also increase branch divergence. This leaves ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید