Treffer 101 - 120 von 2.463

101

Dynamic Information Flow Control Architecture for Web Applications
Yoshihama, Sachiko ; Yoshizawa, Takeo ; Watanabe, Yuji ; et al.
Computer Security – ESORICS 2007 : 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings. 4734:267-282

E-Book
102

Privacy preserving clustering
JHA, Somesh ; KRUGER, Luis ; MCDANIEL, Patrick
Computer security (ESORICS 2005)0ESORICS 2005. :397-417

Computer science Informatique Sciences exactes et tech... Exact sciences and techn... Sciences appliquees Applied sciences
Konferenz
103

The admon-time workflow client: Why do we need the third type of workflow client designated for administration and monitoring services?
KIM, Kwang-Hoon ; KIM, In-Soo
WAIM 2002 : advances in web-age information management (Beijing, 11-13 August 2002)Lecture notes in computer science. :213-224

Computer science Informatique Sciences exactes et tech... Exact sciences and techn... Sciences appliquees Applied sciences
Konferenz
104

Intransitive Noninterference in Dependence Graphs
Hammer, Christian ; Krinke, Jens ; Nodes, Frank
Second International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (isola 2006) Leveraging Applications of Formal Methods, Verification and Validation, 2006. ISoLA 2006. Second International Symposium on. :119-128 Nov, 2006

Konferenz
105

Demand-driven Information Flow Analysis of WebView in Android Hybrid Apps
Tiwari, Abhishek ; Prakash, Jyoti ; Hammer, Christian
2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE) ISSRE Software Reliability Engineering (ISSRE), 2023 IEEE 34th International Symposium on. :415-426 Oct, 2023

Konferenz
106

Background
Zhang, Mu ; Yin, Heng ; Zdonik, Stan, Series editor ; et al.
Android Application Security : A Semantics and Context-Aware Approach. :7-18

E-Book
107

An architecture for workflows interoperability supporting electronic commerce
WIETRZYK, Vlad Ingar ; TAKIZAWA, Makoto ; KHANDELWAL, Vijay
ADBIS 2001 : advances in databases and information systems (Vilnius, 25-28 September 2001)Lecture notes in computer science. :196-209

Computer science Informatique Sciences exactes et tech... Exact sciences and techn... Sciences appliquees Applied sciences
Konferenz
108

DisTA: Generic Dynamic Taint Tracking for Java-Based Distributed Systems
Wang, Dong ; Gao, Yu ; Dou, Wensheng ; et al.
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) DSN Dependable Systems and Networks (DSN), 2022 52nd Annual IEEE/IFIP International Conference on. :547-558 Jun, 2022

Konferenz
109

Deriving an information flow checker and certifying compiler for Java
Barthe, G. ; Naumann, D. ; Rezk, T.
2006 IEEE Symposium on Security and Privacy (S&P'06) Security and Privacy Security and Privacy, 2006 IEEE Symposium on. :13 pp.-242 2006

Konferenz
110

Language-based security
KOZEN, D
MFCS '99 : mathematical foundations of computer science (Szklarska Poręba, 6-10 September 1999)Lecture notes in computer science. :284-298

Computer science Informatique Sciences exactes et tech... Exact sciences and techn... Sciences appliquees Applied sciences
Konferenz
111

Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model
Pistoia, Marco ; Banerjee, Anindya ; Naumann, David A.
2007 IEEE Symposium on Security and Privacy (SP '07) Security and Privacy, 2007. SP '07. IEEE Symposium on. :149-163 May, 2007

Konferenz
112

Dynamic-agents, workflow and XML for e-Commerce automation
QIMING CHEN ; DAYAL, U ; MEICHUN HSU ; et al.
EC-Web 2000 : electronic commerce and web technologies (London, 4-6 September 2000)Lecture notes in computer science. :314-323

Documentation Computer science Informatique Telecommunications Télécommunications Sciences exactes et tech...
Konferenz
113

Stack-based access control and secure information flow
Banerjee, Anindya ; Naumann, David A.
Journal of Functional Programming. 15:131-177

Other programming paradi... 0202 electrical engineer... 02 engineering and techn... 16. Peace & justice
Fachzeitschrift
114

Run-time principals in information-flow type systems
Tse, S. ; Zdancewic, S.
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004 Security and privacy Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on. :179-193 2004

Konferenz
115

Optimal Information Flow Structure for Control of Interconnected Systems
Sojoudi, Somayeh ; Lavaei, Javad ; Aghdam, Amir G.
2007 American Control Conference American Control Conference, 2007. ACC '07. :1508-1513 Jul, 2007

Konferenz
116

Secure information flow and pointer con .nement in a java-like language
Banerjee, A. ; Naumann, D.A.
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15 Computer security foundations workshop Computer Security Foundations Workshop, 2002. Proceedings. 15th IEEE. :239 2002

Konferenz
117

XML-enabled workflow management for e-services across heterogeneous platforms
SHEGALOV, German ; GILLMANN, Michael ; WEIKUM, Gerhard
e-servicesThe VLDB journal. 10(1):91-103

Computer science Informatique Sciences exactes et tech... Exact sciences and techn... Sciences appliquees Applied sciences
Fachzeitschrift
118

μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code
Sun, C. ; Ma, Y. ; Zeng, D. ; et al.
IEEE Transactions on Dependable and Secure Computing IEEE Trans. Dependable and Secure Comput. Dependable and Secure Computing, IEEE Transactions on. 20(2):1461-1475 Apr, 2023

Fachzeitschrift
120

Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
Chandra, Deepak ; Franz, Michael
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual. :463-475 Dec, 2007

Konferenz

Filter