What, Indeed, Is Intransitive Noninterference? (English)
Free access
(Extended Abstract)
- New search for: Meyden, Ron
- New search for: Meyden, Ron
In:
Computer Security – ESORICS 2007
5
;
235-250
;
2007
- Article/Chapter (Book) / Electronic Resource
-
Title:What, Indeed, Is Intransitive Noninterference?
-
Subtitle:(Extended Abstract)
-
Contributors:Meyden, Ron ( author )
-
Published in:Computer Security – ESORICS 2007 , 5 ; 235-250Lecture Notes in Computer Science ; 4734, 5 ; 235-250
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2007-01-01
-
Size:16 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Trustworthy Services and the Biological AnalogyReiter, Michael K. et al. | 2007
- 2
-
Security of Multithreaded Programs by CompilationBarthe, Gilles / Rezk, Tamara / Russo, Alejandro / Sabelfeld, Andrei et al. | 2007
- 19
-
Efficient Proving for Practical Distributed Access-Control SystemsBauer, Lujo / Garriss, Scott / Reiter, Michael K. et al. | 2007
- 38
-
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter ControlKolano, Paul Z. et al. | 2007
- 55
-
Pragmatic XML Access Control Using Off-the-Shelf RDBMSLuo, Bo / Lee, Dongwon / Liu, Peng et al. | 2007
- 72
-
Conditional Privacy-Aware Role Based Access ControlNi, Qun / Lin, Dan / Bertino, Elisa / Lobo, Jorge et al. | 2007
- 90
-
Satisfiability and Resiliency in Workflow SystemsWang, Qihua / Li, Ninghui et al. | 2007
- 106
-
Completeness of the Authentication TestsDoghmi, Shaddin F. / Guttman, Joshua D. / Thayer, F. Javier et al. | 2007
- 122
-
SilentKnock: Practical, Provably Undetectable AuthenticationVasserman, Eugene Y. / Hopper, Nicholas / Laxson, John / Tyra, James et al. | 2007
- 139
-
Generalized Key Delegation for Hierarchical Identity-Based EncryptionAbdalla, Michel / Kiltz, Eike / Neven, Gregory et al. | 2007
- 155
-
Change-Impact Analysis of Firewall PoliciesLiu, Alex X. et al. | 2007
- 171
-
Fragmentation and Encryption to Enforce Privacy in Data StorageCiriani, Valentina / Capitani di Vimercati, Sabrina / Foresti, Sara / Jajodia, Sushil / Paraboschi, Stefano / Samarati, Pierangela et al. | 2007
- 187
-
Information Confinement, Privacy, and Security in RFID SystemsPietro, Roberto / Molva, Refik et al. | 2007
- 203
-
A Logic for State-Modifying Authorization PoliciesBecker, Moritz Y. / Nanz, Sebastian et al. | 2007
- 219
-
Inductive Proofs of Computational SecrecyRoy, Arnab / Datta, Anupam / Derek, Ante / Mitchell, John C. et al. | 2007
- 235
-
What, Indeed, Is Intransitive Noninterference?Meyden, Ron et al. | 2007
- 251
-
Traceability and Integrity of Execution in Distributed Workflow Management SystemsMontagut, Frederic / Molva, Refik et al. | 2007
- 267
-
Dynamic Information Flow Control Architecture for Web ApplicationsYoshihama, Sachiko / Yoshizawa, Takeo / Watanabe, Yuji / Kudoh, Michiharu / Oyanagi, Kazuko et al. | 2007
- 283
-
Cloak: A Ten-Fold Way for Reliable Covert CommunicationsLuo, Xiapu / Chan, Edmond W. W. / Chang, Rocky K. C. et al. | 2007
- 299
-
Efficient Password-Based Authenticated Key Exchange Without Public InformationShao, Jun / Cao, Zhenfu / Wang, Licheng / Lu, Rongxing et al. | 2007
- 311
-
Improved Anonymous Timed-Release EncryptionChalkias, Konstantinos / Hristu-Varsakelis, Dimitrios / Stephanides, George et al. | 2007
- 327
-
Encryption Techniques for Secure Database OutsourcingEvdokimov, Sergei / Günther, Oliver et al. | 2007
- 343
-
Click Passwords Under InvestigationGołofit, Krzysztof et al. | 2007
- 359
-
Graphical Password Authentication Using Cued Click PointsChiasson, Sonia / Oorschot, P. C. / Biddle, Robert et al. | 2007
- 375
-
Obligations and Their Interaction with ProgramsDougherty, Daniel J. / Fisler, Kathi / Krishnamurthi, Shriram et al. | 2007
- 390
-
On the Privacy of Concealed Data AggregationChan, Aldar C. -F. / Castelluccia, Claude et al. | 2007
- 406
-
Synthesizing Secure ProtocolsCortier, Véronique / Warinschi, Bogdan / Zălinescu, Eugen et al. | 2007
- 422
-
A Cryptographic Model for Branching Time Security Properties – The Case of Contract Signing ProtocolsCortier, Véronique / Küsters, Ralf / Warinschi, Bogdan et al. | 2007
- 438
-
Security Evaluation of Scenarios Based on the TCG’s TPM SpecificationGürgens, Sigrid / Rudolph, Carsten / Scheuermann, Dirk / Atts, Marion / Plaga, Rainer et al. | 2007
- 454
-
Analyzing Side Channel Leakage of Masked Implementations with Stochastic MethodsLemke-Rust, Kerstin / Paar, Christof et al. | 2007
- 469
-
Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast LinksAdelsbach, André / Greveler, Ulrich et al. | 2007
- 485
-
Towards Modeling Trust Based Decisions: A Game Theoretic ApproachSankaranarayanan, Vidyaraman / Chandrasekaran, Madhusudhanan / Upadhyaya, Shambhu et al. | 2007
- 501
-
Extending the Common Services of eduGAIN with a Credential Conversion ServiceLópez, Gabriel / Cánovas, Óscar / Lopez, Diego R. / Gómez-Skarmeta, Antonio F. et al. | 2007
- 515
-
Incorporating Temporal Capabilities in Existing Key Management SchemesAtallah, Mikhail J. / Blanton, Marina / Frikken, Keith B. et al. | 2007
- 531
-
A Policy Language for Distributed Usage ControlHilty, M. / Pretschner, A. / Basin, D. / Schaefer, C. / Walter, T. et al. | 2007
- 547
-
Countering Statistical Disclosure with Receiver-Bound Cover TrafficMallesh, Nayantara / Wright, Matthew et al. | 2007
- 563
-
Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous AttackJin, Hongxia / Lotspiech, Jeffery et al. | 2007
- 578
-
Modular Access Control Via Strategic RewritingDougherty, Daniel J. / Kirchner, Claude / Kirchner, Hélène / Santana de Oliveira, Anderson et al. | 2007
- 594
-
On the Automated Correction of Security Protocols Susceptible to a Replay AttackLopez P., Juan C. / Monroy, Raúl / Hutter, Dieter et al. | 2007
- 610
-
Adaptive Soundness of Static EquivalenceKremer, Steve / Mazaré, Laurent et al. | 2007