Listing 1 - 10 of 117 | << page >> |
Sort by
|
Choose an application
Graph theory. --- Information flow. --- Petri nets. --- Real time operation. --- Heterogeneity.
Choose an application
Cold flow tests. --- Information flow. --- Photonics. --- Ejectors. --- Pressure distribution.
Choose an application
Information flow control (IFC) is a technique to assert the security of a given program with respect to a given security policy. The classical policy noninterference requires that public output of a program may not be influenced from secret input. This work leverages a technique called program slicing, which is closely connected to IFC and offers many dimensions for improving analysis precision, the most powerful are Path Conditions. Our evaluation shows scalability with a low annotation burden.
information flow control --- software security --- program slicing --- program dependence graph --- path conditions
Choose an application
The ever-growing levels of complexity of modern information systems complicate the traceability of processed and stored personal data. The individual citizen is at the mercy of the systems. Data protection law tries to counteract this. The right to information is one instrument of data protection to establish transparency. This work critically evaluates the right to information and creates comprehensive technical preconditions for its exercise.
Maths for computer scientists --- Datenschutz --- Auskunft --- Provenance --- Nutzungskontrolle --- Unverkettbarkeit --- Privacy --- Information Flow --- Usage Control --- Unlinkability
Choose an application
Access control. --- Computer information security. --- Information flow. --- Information transfer. --- Models. --- Policies. --- Protection.
Choose an application
Angle of attack. --- Data acquisition. --- Information flow. --- Mach number. --- Reynolds number. --- Sonic booms. --- Wind tunnels.
Choose an application
Choose an application
681.3*D46 --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Informatiebeveiliging --- Informatiebeveiliging. --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems)
Choose an application
681.3*D46 --- 681.3*D46 Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- -681.3*D46 --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Information warfare --- National security --- Military art and science --- Homeland defense --- Homeland security --- Information warfare - United States --- National security - United States
Choose an application
681.3*D46 <043> --- Academic collection --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems)--Dissertaties --- Theses --- 681.3*D46 <043> Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems)--Dissertaties
Listing 1 - 10 of 117 | << page >> |
Sort by
|