[PDF] Top 20 Quantitative Information Flow for Scheduler-Dependent Systems
Has 10000 "Quantitative Information Flow for Scheduler-Dependent Systems" found on our website. Below are the top 20 most common "Quantitative Information Flow for Scheduler-Dependent Systems".
Quantitative Information Flow for Scheduler-Dependent Systems
... France Quantitative information flow analyses measure how much information on secrets is leaked by pub- licly observable ...the information leakage of composed ...component ... Voir le document complet
18
Bits and Bucks: Modeling complex systems by information flow
... Take, for example, trading over the internet. Each flow of information (measured in bits per second) is associated with a flow of energy (measured in ...pay for the commodity is transferred to the ... Voir le document complet
26
Markovian Processes for Quantitative Information Leakage
... of systems that are insecure, but nevertheless useful, in the qualitative sense, such as a password authentication protocol, for which there is always a positive probability that an attacker will randomly ... Voir le document complet
155
Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow
... hardware systems, the statistical approach is often useful to evaluate quantitative aspects of the behaviors of the ...probabilistic systems with complicated internal structures can be approximately ... Voir le document complet
19
On the relation between Differential Privacy and Quantitative Information Flow
... of quantitative information flow (QIF), both in the motivations and in the basic conceptual ...framework. Information flow is con- cerned with the leakage of secret information ... Voir le document complet
18
Quantitative Approaches to Information Hiding
... approaches for quantifying information hiding in communication ...unconstrained scheduler we used and whose behaviour may leak some information to the ...our information-hiding ... Voir le document complet
114
Compositionality Results for Quantitative Information Flow
... to quantitative information flow, the leakage is defined in terms of a minimization problem, which, in case of large systems, can be computationally rather ...pens for the recently ... Voir le document complet
26
Quantitative Modal Transition Systems
... composite systems to be transformed into necessary and sufficient specification of components ...transition systems have all the benefits of both logical and behavioural specification formalisms ... Voir le document complet
11
Adaptive Web server for On-line Information Systems
... tools for user-driven access to ...new information retrieval mechanism based on browsing into database or information systems instead of writing ...hypermedia systems are very useful in ... Voir le document complet
8
Combining Finite Element Method and L-Systems Using Natural Information Flow Propagation to Simulate Growing Dynamical Systems
... 2 Natural Computing of Branch Bending Using Finite Di↵erence Method (FDM) and L-Systems 2.1 Mechanical Model of Branch Bending We model a branch as a set of inextensible elastic cantilever beams rigidly con- ... Voir le document complet
14
Secure architecture for information systems in avionics
... analyzes information flows from error and failure reports, then it specifies the actions to undertake which will resolve errors or ...requirements for critical ...aircraft information system, a ... Voir le document complet
8
Session Types for Access and Information Flow Control
... [16] for the Calculus of Services with Pipelines and Sessions of [4], where delegation is ...secure information flow has not been investigated within session calculi so ...studied for both ... Voir le document complet
49
Hybrid Information Flow Analysis for Real-World C Code
... digits of the operands. Finally, we simplied code for parsing serialized ECC keys. The code was in principle analyzable, but its complexity caused unneces- sary slowdowns in Eva, hindering our experiments. After ... Voir le document complet
19
Information Systems and Web Information Systems: A Methodological Perspective
... the information affected by their occurrence and the functions that cause this effect to be ...felt. For this, three things are done (a) Real events are abstracted into information bearing events, ... Voir le document complet
12
Composite information systems : a new concept in information systems
... virtual machines and for resolving data format differences among the user's execution environments and the various database.. These strategies include: use of shared virtual disk.[r] ... Voir le document complet
134
A scheduler for relative delay service differentiation
... for an aggregate ...selected for service. These may restrict their implementation, for example switches/routers not maintaining separate queues per class will not be able to use them except if they ... Voir le document complet
21
Optical flow with structure information for epithelial image mosaicing
... Variational OF methods use coarse-to-fine energy mini- mization approaches to handle large displacements. However, using original images in a multi-resolution approach leads to the “flattening-out” problem in image ... Voir le document complet
5
Modular Monitor Extensions for Information Flow Security in JavaScript
... Although JavaScript can be used as a general-purpose programming language, many JavaScript programs are designed to be executed in a browser in the context of a web page. Such programs often interact with the web page in ... Voir le document complet
17
Information Flow Security for Asynchronous, Distributed, and Mobile Applications
... targeting information flow control in languages have also been ...background information of how covert channels, integrity, mandatory access controls, static controls (by type checking techniques), ... Voir le document complet
104
Information Flow Policies vs Malware
... An information flow policy (as previously detailed) suffers from its ...legal information flows in a running operating ...policies for real applications. It can become time-consuming ... Voir le document complet
11
Sujets connexes