X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
noninterference (60) 60
security (25) 25
computer science (17) 17
information flow (16) 16
computer science, software engineering (15) 15
computer science, theory & methods (13) 13
algorithms (9) 9
declassification (9) 9
information-flow (8) 8
analysis (7) 7
computer science, information systems (7) 7
programs (7) 7
type systems (7) 7
programming languages (6) 6
theoretical computer science (6) 6
computer security (5) 5
information management (5) 5
information systems (5) 5
non-interference (5) 5
noninterference constraints (5) 5
operating systems (5) 5
operations research & management science (5) 5
software (5) 5
asean (4) 4
computer communication networks (4) 4
computer information security (4) 4
covert channels (4) 4
data encryption (4) 4
downgrading (4) 4
information flow control (4) 4
language (4) 4
language-based security (4) 4
languages (4) 4
logic (4) 4
management of computing and information systems (4) 4
model (4) 4
process algebra (4) 4
scheduling (4) 4
studies (4) 4
access control (3) 3
berth allocation (3) 3
bisimulation (3) 3
coding and information theory (3) 3
communications engineering, networks (3) 3
computational theory and mathematics (3) 3
confidentiality (3) 3
data security (3) 3
design (3) 3
engineering, industrial (3) 3
genetic algorithm (3) 3
information flow security (3) 3
informationsfluss (3) 3
integrity (3) 3
international relations (3) 3
intransitive noninterference (3) 3
java (3) 3
mathematical models (3) 3
multilevel security (3) 3
multilevel systems (3) 3
multiprocessing (3) 3
pi-calculus (3) 3
policies (3) 3
political science (3) 3
program dependence graph (3) 3
security type system (3) 3
software security (3) 3
static analysis (3) 3
verification (3) 3
[ info.info-cr ] computer science [cs]/cryptography and security [cs.cr] (2) 2
[ info.info-iu ] computer science [cs]/ubiquitous computing (2) 2
abstract interpretation (2) 2
access (2) 2
ada (2) 2
algebra (2) 2
area studies (2) 2
certification (2) 2
checking (2) 2
china (2) 2
complexity (2) 2
computer programs (2) 2
containers (2) 2
containerterminal (2) 2
control (2) 2
controlled exchange (2) 2
cryptography and security (2) 2
datavetenskap (2) 2
datenschutz (2) 2
enforcement (2) 2
engineering, electrical & electronic (2) 2
engineering, manufacturing (2) 2
epistemic logic (2) 2
freedom (2) 2
geheimhaltung (2) 2
information analysis (2) 2
information science (2) 2
information-flow control (2) 2
integer programming (2) 2
jif (2) 2
kran (2) 2
language based security (2) 2
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


European Journal of Operational Research, ISSN 0377-2217, 04/2017, Volume 258, Issue 1, pp. 343 - 357
Journal Article
Journal Article
Computers and Operations Research, ISSN 0305-0548, 11/2018, Volume 99, pp. 218 - 233
The scheduling of quay cranes (QCs) to minimize the handling time of a berthed vessel is one of the most important operations in container terminals as it... 
Quay crane scheduling problem | Scheduling | Container terminals | Mixed-integer programming | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | OPERATIONS RESEARCH & MANAGEMENT SCIENCE | STABILITY | ASSIGNMENT | TIME | NONINTERFERENCE CONSTRAINTS | ENGINEERING, INDUSTRIAL | GENETIC ALGORITHM APPROACH
Journal Article
Information and Computation, ISSN 0890-5401, 11/2014, Volume 238, pp. 68 - 105
We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that... 
Access control | Communication-centred computing | Secure information flow | Session types | MATHEMATICS, APPLIED | PROGRAMS | COMPUTER SCIENCE, THEORY & METHODS | PIPELINES | NONINTERFERENCE
Journal Article
Advances in Computers, ISSN 0065-2458, 01/2019, Volume 113, pp. 289 - 314
Symbolic execution is a systematic program analysis technique which executes programs on symbolic inputs, representing multiple concrete inputs, and represents... 
Side channels | Fuzzing | Worst-case analysis | Noninterference | Symbolic execution | Testing | COMPUTER SCIENCE, SOFTWARE ENGINEERING | GENERATION | INFORMATION-FLOW
Conference Proceeding
2018 IEEE Symposium on Security and Privacy (SP), ISSN 1081-6011, 05/2018, Volume 2018-, pp. 496 - 513
An information flow policy is termination-sensitive if it imposes that the termination behavior of programs is not influenced by confidential input.... 
Impossibility | Secure Multi Execution | Lattices | Observers | Programming | Security | Termination Sensitive Noninterference | Privacy | Enforcement | Soundness | Precision | Monitoring | Load modeling
Conference Proceeding
Journal of Systems Architecture, ISSN 1383-7621, 2011, Volume 57, Issue 3, pp. 282 - 293
Journal Article
Tongxin Xuebao/Journal on Communications, ISSN 1000-436X, 12/2014, Volume 35, Issue 12, pp. 144 - 152
Aiming at the problem of dynamic data security exchange behavior cannot be controlled, methods for trusted analysis of exchange process behavior based on... 
Controlled exchange | Noninterference policy | Trust | Process behavior | Exchange | Availability | Dynamic tests | Judgments | Stock exchanges | Dynamics | China | Security
Journal Article
中国邮电高校学报:英文版, ISSN 1005-8885, 2015, Volume 22, Issue 4, pp. 7 - 16
To ensure the integrity and security of cloud tenants' workload, and to prevent unexpected interference among tenants, cloud platform must make sure that... 
信任域 | 层次模型 | 模型基 | 安全性能分析 | 原型系统 | 干扰理论 | 计算环境 | 工作负载 | cloud | trusted domain | integrity | security | noninterference theory | trusted domain hierarchical model | Design engineering | Cloud computing | Platforms | Formal method | Running | Computer information security | Acceptability | Workload
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2002, Volume 2477, pp. 310 - 325
We are concerned to give certain guarantees about the security of a system. We identify two kinds of attack: the internally scheduled attack (exemplified by... 
OPERATOR THEORY | COMPUTER SCIENCE, THEORY & METHODS | PSEUDO-INVERSE | PROGRAMS | NONINTERFERENCE
Conference Proceeding
Proceedings - 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer, MEC 2013, 2013, pp. 2162 - 2167
Conference Proceeding
2010 10th International Conference on Quality Software, ISSN 1550-6002, 07/2010, pp. 142 - 150
Automated verification of noninterference is commonly considered more precise than type-based approach on enforcing secure information flow for program. We... 
information flow | Java | Analytical models | Object oriented modeling | pushdown system | noninterference | Software | Security | Indexes | Reachability analysis | self-composition | Self-composition | Pushdown system | Noninterference | Information flow
Conference Proceeding
Proceedings of the 5th ACM SIGPLAN international conference on principles and practice of declaritive programming, 08/2003, Volume 5, pp. 91 - 101
We propose a new algorithm of secrecy analysis in a framework integrating declarative programming and concurrency. The analysis of a program ensures that... 
abstract interpretation | safety | noninterference | Noninterference | Abstract interpretation | Safety
Conference Proceeding
ACM Transactions on Information and System Security (TISSEC), ISSN 1094-9224, 12/2015, Volume 18, Issue 2, pp. 1 - 30
We demonstrate, by a number of examples, that information flow security properties can be proved from abstract architectural descriptions, which describe only... 
epistemic logic | Information flow security | intransitive noninterference | system architecture | Intransitive noninterference | System architecture | Epistemic logic | REFINEMENT | DECLASSIFICATION | COMPUTER SCIENCE, INFORMATION SYSTEMS | FLOW | NONINTERFERENCE
Journal Article
Computer Languages, Systems & Structures, ISSN 1477-8424, 11/2016, Volume 46, pp. 20 - 43
Journal Article
Science of Computer Programming, ISSN 0167-6423, 12/2018, Volume 168, pp. 118 - 141
Information flow techniques typically classify information according to suitable security levels and enforce policies that are based on binary relations... 
Non-interference | Coordination | Causality | Information flow | Declassification | information flow | COMPUTER SCIENCE, SOFTWARE ENGINEERING | SECURITY | EVENT STRUCTURES | NONINTERFERENCE | Analysis | Information management
Journal Article
International Journal of Information Security, ISSN 1615-5262, 2009, Volume 8, Issue 6, pp. 399 - 422
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.