Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Declassification: Dimensions and principles
Computing systems often deliberately release (or declassify) sensitive information. A
principal security concern for systems permitting information release is whether this release …
principal security concern for systems permitting information release is whether this release …
A model for delimited information release
Much work on security-typed languages lacks a satisfactory account of intentional
information release. In the context of confidentiality, a typical security guarantee provided by …
information release. In the context of confidentiality, a typical security guarantee provided by …
Dimensions and principles of declassification
Computing systems often deliberately release (or declassify) sensitive information. A
principal security concern for systems permitting information release is whether this release …
principal security concern for systems permitting information release is whether this release …
Enforcing robust declassification
Noninterference requires that there is no information flow from sensitive to public data in a
given system. However, many systems perform intentional release of sensitive information …
given system. However, many systems perform intentional release of sensitive information …
Enforcing robust declassification and qualified robustness
Noninterference requires that there is no information flow from sensitive to public data in a
given system. However, many systems release sensitive information as part of their intended …
given system. However, many systems release sensitive information as part of their intended …
Controlled declassification based on intransitive noninterference
Traditional noninterference cannot cope with common features of secure systems like
channel control, information filtering, or explicit downgrading. Recent research has …
channel control, information filtering, or explicit downgrading. Recent research has …
Noninterference for a practical difc-based operating system
M Krohn, E Tromer - 2009 30th IEEE Symposium on Security …, 2009 - ieeexplore.ieee.org
The Flume system is an implementation of decentralized information flow control (DIFC) at
the operating system level. Prior work has shown Flume can be implemented as a practical …
the operating system level. Prior work has shown Flume can be implemented as a practical …
Java program verification at Nijmegen: Developments and perspective
This paper presents a historical overview of the work on Java program verification at the
University of Nijmegen (the Netherlands) over the past six years (1997–2003). It describes …
University of Nijmegen (the Netherlands) over the past six years (1997–2003). It describes …
Localized delimited release: combining the what and where dimensions of information release
Information release (or declassification) policies are the key challenge for language-based
information security. Although much progress has been made, different approaches to …
information security. Although much progress has been made, different approaches to …
What, indeed, is intransitive noninterference?
R Van Der Meyden - Computer Security–ESORICS 2007: 12th European …, 2007 - Springer
This paper argues that Haigh and Young's definition of noninterference for intransitive
security policies admits information flows that are not in accordance with the intuitions it …
security policies admits information flows that are not in accordance with the intuitions it …