if � � if [b] l then S1 else S2, σ � � →� � S1, σ � � , if B�b � σ = true if � � if [b] l then S1 else S2, σ � � →� � S2, σ � � , if B�b � σ = false wh � � while [b] l do S, σ � � → � � S; while [b] l do S,σ � � , if B�b � σ = true
Information flow is the branch of security that studies the leakage ofinformation due to correlation...
In today's information-based society, guaranteeing information security plays an important role in a...
Abstract. Information flow analysis plays a vital role in obtaining quan-titative bounds on informat...
对于网络数据流安全检测问题,文章提出将用于文档复制检测的指纹技术应用于网络数据流的内容安全性检测上的新方法,并对文档指纹提取算法做了改进优化,改进后的算法能够有效检测网络中的数据流是否存在信息泄露问题...
When giving a program access to secret information, one must ensure that the program does not le...
In this paper we describe two uses of Boolean functions in the context of secure information flow an...
Abstract. Detecting information flows inside a program is useful to check non-interference of progra...
AbstractControl Flow Analysis is a static technique for predicting safe and computable approximation...
Abstract Information-flow analysis can prevent programs from improperlyrevealing secret information,...
We provide a novel definition of quantitative information flow, called transmissible information, th...
In this thesis, we elaborate a uniform basis for the systematic investigation of possibilistic infor...
AbstractDetecting information flows inside a program is useful to check non-interference or independ...
A software product line encodes a potentially large variety of software products as variants of some...
We investigate the integration of two approaches to information security: information flow analysis,...
We introduce the νspi-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
Information flow is the branch of security that studies the leakage ofinformation due to correlation...
In today's information-based society, guaranteeing information security plays an important role in a...
Abstract. Information flow analysis plays a vital role in obtaining quan-titative bounds on informat...
对于网络数据流安全检测问题,文章提出将用于文档复制检测的指纹技术应用于网络数据流的内容安全性检测上的新方法,并对文档指纹提取算法做了改进优化,改进后的算法能够有效检测网络中的数据流是否存在信息泄露问题...
When giving a program access to secret information, one must ensure that the program does not le...
In this paper we describe two uses of Boolean functions in the context of secure information flow an...
Abstract. Detecting information flows inside a program is useful to check non-interference of progra...
AbstractControl Flow Analysis is a static technique for predicting safe and computable approximation...
Abstract Information-flow analysis can prevent programs from improperlyrevealing secret information,...
We provide a novel definition of quantitative information flow, called transmissible information, th...
In this thesis, we elaborate a uniform basis for the systematic investigation of possibilistic infor...
AbstractDetecting information flows inside a program is useful to check non-interference or independ...
A software product line encodes a potentially large variety of software products as variants of some...
We investigate the integration of two approaches to information security: information flow analysis,...
We introduce the νspi-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
Information flow is the branch of security that studies the leakage ofinformation due to correlation...
In today's information-based society, guaranteeing information security plays an important role in a...
Abstract. Information flow analysis plays a vital role in obtaining quan-titative bounds on informat...