Treffer 1 - 20 von 300

1

Using Information Flow to estimate interference between developers same method contributions
Filho, Roberto Souto Maior de Barros ; Borba, Paulo

Computer Science - Softw...
Report
Merkliste
2

Using JOANA for Information Flow Control in Java Programs - A Practical Guide
Martin Hecker ; Martin Mohr ; The Pennsylvania State University CiteSeerX Archives
http://subs.emis.de/LNI/Proceedings/Proceedings215/123.pdf.

Fachzeitschrift
Merkliste
3

Using JOANA for Information Flow Control in Java Programs - A Practical Guide
Graf, Jürgen ; Hecker, Martin ; Mohr, Martin
ISSN: 2190-4782.

ddc:004 DATA processing & comput... info:eu-repo/classificat...
Buch
Merkliste
4

Using JOANA for information flow control in Java programs - A practical guide
Graf, Jürgen ; Hecker, Martin ; Mohr, Martin ; et al.

Konferenz
Merkliste
5

Evaluation of Jif and Joana as Information Flow Analyzers in a Model-Driven Approach.
Katkalov, Kuzman ; Fischer, Peter ; Stenzel, Kurt ; et al.
Data Privacy Management & Autonomous Spontaneous Security (9783642358890); 2013, p174-186, 13p

Buch
Merkliste
6

Analysis of Java programs using Joana and Java SDG API.
Kumar, Ranjan ; Panda, Subhrakanta ; Mohapatra, Durga Prasad
2015 International Conference on Advances in Computing, Communications & Informatics (ICACCI); 2015, p2402-2408, 7p

Konferenz
Merkliste
7

Immutability and Encapsulation for Sound OO Information Flow Control.
RUNGE, TOBIAS ; SERVETTO, MARCO ; POTANIN, ALEX ; et al.
ACM Transactions on Programming Languages & Systems; Mar2023, Vol. 45 Issue 1, p1-35, 35p

INFORMATION resources ma... LEAK detection LEAKS (Disclosure of inf... INFORMATION policy APPLICATION software
Fachzeitschrift
Merkliste
8

Information Flow Control in Software DB Units Based on Formal Verification.
Timakov, A. A.
Programming & Computer Software; Aug2022, Vol. 48 Issue 4, p265-285, 21p

COMPUTER security INFORMATION resources ma... COMPUTER access control... ELECTRONIC data processi... DATABASES ACCESS control
Fachzeitschrift
Merkliste
9

Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs.
Hammer, Christian ; Snelting, Gregor
International Journal of Information Security; Dec2009, Vol. 8 Issue 6, p399-422, 24p, 13 Diagrams, 1 Chart

COMPUTER software securi... GRAPHIC methods INFORMATION technology s... COMPUTER science ALGORITHMS
Fachzeitschrift
Merkliste
10

IFCaaS: Information Flow Control as a Service for Cloud Security.
Elsayed, Marwa ; Zulkernine, Mohammad
2016 11th International Conference on Availability, Reliability & Security (ARES); 2016, p211-216, 6p

Konferenz
Merkliste
11

Value Sensitivity and Observable Abstract Values for Information Flow Control.
Bello, Luciano ; Hedin, Daniel ; Sabelfeld, Andrei
Logic for Programming, Artificial Intelligence & Reasoning: 20th International Conference, LPAR-20 2015, Suva, Fiji, November 24-28, 2015, Proceedings; 2015, p63-78, 16p

Buch
Merkliste
12

Checking probabilistic noninterference using JOANA.
Snelting, Gregor ; Giffhorn, Dennis ; Graf, Jürgen ; et al.
IT: Information Technology; Dec2014, Vol. 56 Issue 6, p280-287, 8p

INVESTMENT analysis SOFTWARE development too... CASE studies ALGORITHMS ANNOTATIONS
Fachzeitschrift
Merkliste
13

Information-flow interfaces.
Bartocci, Ezio ; Ferrère, Thomas ; Henzinger, Thomas A. ; et al.
Formal Methods in System Design; May2025, Vol. 66 Issue 1, p3-48, 46p

LANDSCAPE design CONTRACT theory DESIGNERS CONTRACTS
Fachzeitschrift
Merkliste
14

Modular Product Programs.
EILERS, MARCO ; MÜLLER, PETER ; HITZ, SAMUEL
ACM Transactions on Programming Languages & Systems; Jan2020, Vol. 42 Issue 1, p1-37, 37p

INFORMATION technology s... TECHNICAL specifications
Fachzeitschrift
Merkliste
15

SHRIFT System-Wide HybRid Information Flow Tracking.
Lovat, Enrico ; Fromm, Alexander ; Mohr, Martin ; et al.
ICT Systems Security & Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings; 2015, p371-385, 15p

Buch
Merkliste
16

Jif-Based Verification of Information Flow Policies for Android Apps.
Jimenez, Lina M. ; Ochoa, Martin ; Rueda, Sandra J.
International Journal of Secure Software Engineering; Jan-Mar2017, Vol. 8 Issue 1, p28-42, 15p

Fachzeitschrift
Merkliste
17

Using information flow to estimate interference between same-method contributions
BARROS FILHO, Roberto Souto Maior de ; BORBA, Paulo Henrique Monteiro ; http://lattes.cnpq.br/3013585077467789 ; et al.

Engenharia de software Integração de software
Dissertation
Merkliste
18

Modeling information flow properties with UML.
Katkalov, Kuzman ; Stenzel, Kurt ; Borek, Marian ; et al.
2015 7th International Conference on New Technologies, Mobility & Security (NTMS); 2015, p1-5, 5p

Konferenz
Merkliste
19

A Hybrid Approach for Proving Noninterference of Java Programs.
Kusters, Ralf ; Truderung, Tomasz ; Beckert, Bernhard ; et al.
2015 IEEE 28th Computer Security Foundations Symposium; 2015, p305-319, 15p

Konferenz
Merkliste
20

Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study.
Do, Quoc Huy ; Kamburjan, Eduard ; Wasser, Nathan
Principles of Security & Trust (9783662496343); 2016, p97-115, 19p

Buch
Merkliste

Filter