Clonedifferentiator: Analyzing clones by differentiation
Clone detection provides a scalable and efficient way to detect similar code fragments. But it
offers limited explanation of differences of functions performed by clones and variations of …
offers limited explanation of differences of functions performed by clones and variations of …
Language-based missing function call detection
Described is a language-based system for detecting function calls. The system detects
missing authorization and authentication functionality in computer software source code via …
missing authorization and authentication functionality in computer software source code via …
Informative types and effects for hybrid migration control
Flow policy confinement is a property of programs whose declassifications respect the
allowed flow policy of the context in which they execute. In a distributed setting where …
allowed flow policy of the context in which they execute. In a distributed setting where …
Information flow in a distributed security setting
Information flow security is classically formulated in terms of the absence of illegal
information flows, with respect to a security setting consisting of a single flow policy that …
information flows, with respect to a security setting consisting of a single flow policy that …
Distributed noninterference
Noninterference is the classic information flow property that establishes the absence of
illegal information flows. Legality of flows is originally defined with respect to a single …
illegal information flows. Legality of flows is originally defined with respect to a single …
[PDF][PDF] Flow policy awareness for distributed information flow security
AA Matosa, J Cederquista - ist.utl.pt
In the context of distributed and mobile computing, information flow security must deal with
the decentralized nature of security policies. This issue is particularly challenging when …
the decentralized nature of security policies. This issue is particularly challenging when …