Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

15 results
Keywords : Information flow
Image document

Many-to-Many Information Flow Policies

Paolo Baldan , Alessandro Beggiato , Alberto Lluch Lafuente
19th International Conference on Coordination Languages and Models (COORDINATION), Jun 2017, Neuchâtel, Switzerland. pp.159-177, ⟨10.1007/978-3-319-59746-1_9⟩
Conference papers hal-01657347v1
Image document

Temporal-Based Ranking in Heterogeneous Networks

Chen Yu , Ruidan Li , Dezhong Yao , Feng Lu , Hai Jin
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.23-34, ⟨10.1007/978-3-662-44917-2_3⟩
Conference papers hal-01403054v1
Image document

Worst- and Average-Case Privacy Breaches in Randomization Mechanisms

Michele Boreale , Michela Paolini
7th International Conference on Theoretical Computer Science (TCS), Sep 2012, Amsterdam, Netherlands. pp.72-86, ⟨10.1007/978-3-642-33475-7_6⟩
Conference papers hal-01556211v1
Image document

Output-sensitive Information flow analysis

Cristian Ene , Laurent Mounier , Marie-Laure Potet
39th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2019, Copenhagen, Denmark. pp.93-110, ⟨10.1007/978-3-030-21759-4_6⟩
Conference papers hal-02303984v1
Image document

Leveraging Web Intelligence for Information Cascade Detection in Social Streams

Mohamed Cherif Nait-Hamoud , Fedoua Didi , Abdelatif Ennaji
6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.56-65, ⟨10.1007/978-3-319-89743-1_6⟩
Conference papers hal-01913877v1
Image document

Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter

Dongjin Choi , Ilsun You , Pankoo Kim
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.253-260, ⟨10.1007/978-3-642-36818-9_26⟩
Conference papers hal-01480180v1
Image document

Forensic Leak Detection for Business Process Models

Rafael Accorsi , Claus Wonnemann
7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.101-113, ⟨10.1007/978-3-642-24212-0_8⟩
Conference papers hal-01569546v1
Image document

Only Connect, Securely

Chandrika Bhardwaj , Sanjiva Prasad
39th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2019, Copenhagen, Denmark. pp.75-92, ⟨10.1007/978-3-030-21759-4_5⟩
Conference papers hal-02313753v1
Image document

Quantitative Information Flow under Generic Leakage Functions and Adaptive Adversaries

Michele Boreale , Francesca Pampaloni
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.166-181, ⟨10.1007/978-3-662-43613-4_11⟩
Conference papers hal-01398015v1
Image document

Distributed Middleware Enforcement of Event Flow Security Policy

Matteo Migliavacca , Ioannis Papagiannis , David M. Eyers , Brian Shand , Jean Bacon , et al.
ACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.334-354, ⟨10.1007/978-3-642-16955-7_17⟩
Conference papers hal-01055277v1
Image document

Reasoning About Distributed Secrets

Nicolás Bordenabe , Annabelle Mciver , Carroll Morgan , Tahiry Rabehaja
37th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2017, Neuchâtel, Switzerland. pp.156-170, ⟨10.1007/978-3-319-60225-7_11⟩
Conference papers hal-01658413v1
Image document

A Security Policy Model for Agent Based Service-Oriented Architectures

Eckehard Hermann
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.13-25, ⟨10.1007/978-3-642-23300-5_2⟩
Conference papers hal-01590399v1
Image document

Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android

Daniel Schreckling , Joachim Posegga , Johannes Köstler , Matthias Schaff
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.208-223, ⟨10.1007/978-3-642-30955-7_18⟩
Conference papers hal-01534306v1
Image document

Constructing Inference-Proof Belief Mediators

Joachim Biskup , Cornelia Tadros
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.188-203, ⟨10.1007/978-3-319-20810-7_12⟩
Conference papers hal-01745830v1
Image document

Enforcing End-to-End Application Security in the Cloud

Jean Bacon , David Evans , David M. Eyers , Matteo Migliavacca , Peter Pietzuch , et al.
ACM/IFIP/USENIX 11th International Middleware Conference (MIDDLEWARE), Nov 2010, Bangalore, India. pp.293-312, ⟨10.1007/978-3-642-16955-7_15⟩
Conference papers hal-01055278v1