نتایج جستجو برای: information flow control

تعداد نتایج: 2748403  

Journal: :Scalable Computing: Practice and Experience 2011
Aneta Poniszewska-Maranda

Development of technology, progress and increase of information flow have the impact also on the development of enterprises and require rapid changes in their information systems. The growth and complexity of functionality that they currently should face cause that their design and realization become the difficult tasks and strategic for the enterprises at the same time. The informations system...

2016
Andrew Bedford Stephen Chong Josée Desharnais Nadia Tawbi

We present a novel progress-sensitive, flow-sensitive hybrid information-flow control monitor for an imperative interactive language. Progress-sensitive information-flow control is a strong information security guarantee which ensures that a program’s progress (or lack of) does not leak information. Flow-sensitivity means that this strong security guarantee is enforced fairly precisely: we trac...

2012
David A. Schultz

Privacy and integrity concerns have been mounting in recent years as sensitive data such asmedical records, social network records, and corporate and government secrets are increasingly being stored in online systems. The rate of high-profile breaches has illustrated that current techniques are inadequate for protecting sensitive information. Many of these breaches involve databases that handle...

Journal: :European Transactions on Telecommunications 1997
Omar Ait-Hellal Eitan Altman Tamer Basar

The ATM Forum has chosen the rate-based approach for ow control of ABR (Available Bit Rate) traac in ATM. It is based on a reactive approach whereby the transmission rate of ABR sources can be adapted to the available bandwidth at a bottleneck link. The ATM forum has speciied the behavior of the source and destination, as well as the manner in which feedback information (on the available bandwi...

2013
Willem De Groef Dominique Devriese Mathy Vanhoef Frank Piessens

Modern web applications heavily rely on JavaScript code executing in the browser. These web scripts are useful for instance for improving the interactivity and responsiveness of web applications, and for gathering web analytics data. However, the execution of server-provided code in the browser also brings substantial security and privacy risks. Web scripts can access a fair amount of sensitive...

2008
Maxwell N. Krohn

Sometimes Web sites fail in the worst ways. They can reveal private data that can never be retracted [60, 72, 78, 79]. Or they can succumb to vandalism, and subsequently show corrupt data to users [27]. Blame can fall on the off-the-shelf software that runs the site (e.g., the operating system, the application libraries, the Web server, etc.), but more frequently (as in the above references), t...

2009
David M. Eyers Ben Roberts Jean Bacon Ioannis Papagiannis Matteo Migliavacca Peter R. Pietzuch Brian Shand

• Java runtime library shrinking: only includes necessary reachable classes • Classification of common coding patterns that are safe, but fail static analysis • Use of aspect-oriented weaving tools to intercept call paths that have not been whitelisted by to static analysis or manual examination • Investigating just-in-time application of I-JVM's static field techniques • Appreciation that the ...

2014
Abhishek Bichhawat Vineet Rajani Deepak Garg Christian Hammer

Websites today routinely combine JavaScript from multiple sources, both trusted and untrusted. Hence, JavaScript security is of paramount importance. A specific interesting problem is information flow control (IFC) for JavaScript. In this paper, we develop, formalize and implement a dynamic IFC mechanism for the JavaScript engine of a production Web browser (specifically, Safari’s WebKit engine...

1999
Andrew C. Myers

The growing use of mobile code in downloaded programs such as applets and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Common security mechanisms such as sandboxing and access control are either too restrictive or too weak—they prevent applications from sharing data usefully, or allow private information to leak. For example, security mechanisms in Java...

1998
Masashi Yasuda Takayuki Tachikawa Makoto Takizawa

J,;6%7%9%F%‘$K$*$1$k>pJsN.@)8f 0BED >;;K N)@n 7I9T BlBt @? El5~EE5!Bg3XM}9)3XIt7P1D9)3X2J J,;61~MQ$O!"J#?t$N%*%V%8%’%/%H$+$i$J$k%0%k!<%W$,DL?.LV$rDL$8$F%a%C%;!<%8$N8r49$r9T$&$3$H$G]7?A‘:n1i;;$NBP$K$h$jI=8=$5$l!"%*%V%8%’%/%H$K$h$jDs6!$5$l$kA‘ 1i;;$rDL$7$F$N$_A‘:n$9$k$3$H$,$G$-$k!#$^$?!"A‘:n1i;;$O$5$i$KB>$N%*%V%8%’%/%H$,Ds6!$9$kA‘:n1i;;$r $S=P$9$3$H$,$"$k...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید