Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Assumptions and guarantees for compositional noninterference
The idea of building secure systems by plugging together" secure''components is appealing,
but this requires a definition of security which, in addition to taking care of top-level security …
but this requires a definition of security which, in addition to taking care of top-level security …
Expressing information flow properties
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …
to handle sensitive information responsibly. Regulatory requirements and user expectations …
Checking probabilistic noninterference using JOANA
JOANA is a tool for software security analysis, checking up to 100 kLOC of full multi-
threaded Java. JOANA is based on sophisticated program analysis techniques and thus …
threaded Java. JOANA is based on sophisticated program analysis techniques and thus …
HyperATL*: A logic for hyperproperties in multi-agent systems
Hyperproperties are system properties that relate multiple computation paths in a system
and are commonly used to, eg, define information-flow policies. In this paper, we study a …
and are commonly used to, eg, define information-flow policies. In this paper, we study a …
Hybrid monitors for concurrent noninterference
Controlling confidential information in concurrent systems is difficult, due to covert channels
resulting from interaction between threads. This problem is exacerbated if threads share …
resulting from interaction between threads. This problem is exacerbated if threads share …
[HTML][HTML] Mac a verified static information-flow control library
The programming language Haskell plays a unique, privileged role in information-flow
control (IFC) research: it is able to enforce information security via libraries. Many state-of …
control (IFC) research: it is able to enforce information security via libraries. Many state-of …
A temporal logic for strategic hyperproperties
Hyperproperties are commonly used in computer security to define information-flow policies
and other requirements that reason about the relationship between multiple computations. In …
and other requirements that reason about the relationship between multiple computations. In …
A new algorithm for low-deterministic security
D Giffhorn, G Snelting - International Journal of Information Security, 2015 - Springer
We present a new algorithm for checking probabilistic noninterference in concurrent
programs. The algorithm, named RLSOD, is based on the Low-Security Observational …
programs. The algorithm, named RLSOD, is based on the Low-Security Observational …
[PDF][PDF] Compositional non-interference for concurrent programs via separation and framing
Reasoning about information flow in a concurrent setting is notoriously difficult due in part to
timing channels that may leak sensitive information. In this paper, we present a …
timing channels that may leak sensitive information. In this paper, we present a …
Towards a practical secure concurrent language
We demonstrate that a practical concurrent language can be extended in a natural way with
information security mechanisms that provably enforce strong information security …
information security mechanisms that provably enforce strong information security …