Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Operating Systems (D.4) > Security and Protection (D.4.6) > Information Flow Controls (D.4.6...)  
 
Options:
 
  1-9 of 9 Reviews about "Information Flow Controls (D.4.6...)": Date Reviewed
  Viruses in all dimensions: how an information code controls viruses, software and microorganisms
Ball R., Springer International Publishing, New York, NY, 2023. 156 pp.  Type: Book (9783658388256)

It has been several decades since the emergence of the first recognized computer virus. The infectious behavior of computer viruses gave them their name--an analogy to the original biological variety. The book’s goal is to draw this con...

Jul 6 2023
  Generalized approach to modeling user activity graphs for network security and public safety monitoring
Sergeev N., Tselykh A., Tselykh A.  SIN 2013 (Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey, Nov 26-28, 2013) 117-122, 2013.  Type: Proceedings

Analysis and monitoring of user behaviors in social media and online social networks are of key concern for information security, public safety, and situation awareness. The authors’ goal is to model user activities, which ar...

Mar 24 2014
  Cross-VM side channels and their use to extract private keys
Zhang Y., Juels A., Reiter M., Ristenpart T.  CCS 2012 (Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, Oct 16-18, 2012) 305-316, 2012.  Type: Proceedings

The discovery of a high-impact side-channel attack is bad news for vulnerable systems, as it affects their design in an unexpected way. Side channel-attacks have been studied for virtual machines with very limited success up to now. Co...

Feb 8 2013
   Measuring the strength of information flows in programs
Masri W., Podgurski A. ACM Transactions on Software Engineering and Methodology 19(2): 1-33, 2009.  Type: Article

A detailed analysis of the use of correlation and entropy measures to examine the relationship between data and control variables, as accessed by different programs, is presented in this paper. The idea is to see if, by exhaustively te...

Feb 2 2010
  Perfect storm: the insider, naivety, and hostility
Thompson H., Ford R. Queue 2(4): 58-65, 2004.  Type: Article

Troy was taken from the inside. The story of the Trojan horse, known to us for more than two millennia, has endured for a long time. It tells of a universal threat, that of attack from inside the walls....

Aug 16 2005
  Forensic discovery
Farmer D., Venema W., Addison Wesley Professional, 2004.  Type: Book (9780201634976)

This book is a great blend of practical, ready-to-use knowledge and theory. Well-known tools of the trade are described, along with the corresponding background information, which adds up to an exciting and valuable read....

May 3 2005
  Buffer overflow and format string overflow vulnerabilities
Lhee K., Chapin S. Software--Practice & Experience 33(5): 423-460, 2003.  Type: Article

The true concept of buffer overflow is that of a new type of programming error that was (possibly unwillingly) invented by the authors of the programming language C....

Aug 4 2003
  Protecting privacy using the decentralized label model
Myers A., Liskov B. ACM Transactions on Software Engineering and Methodology 9(4): 410-442, 2000.  Type: Article

The decentralized label model is a policy for labeling data in a computer system to preserve confidentiality and integrity. Its philosophical roots are in the Denning lattice model, in which static analysis of programming language stat...

Apr 1 2001
  A Hookup Theorem for Multilevel Security
McCullough D. IEEE Transactions on Software Engineering 16(6): 563-568, 1990.  Type: Article

Some designers of multilevel secure systems have been assuming that given two systems that individually have the deducibility security property, their composition has this property. McCullough presents a counterexample to this conjectu...

Apr 1 1991
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy