• Datalog

  • Referenced in 293 articles [sw20023]
  • application in data integration, information extraction, networking, program analysis, security, and cloud computing...
  • KIV

  • Referenced in 53 articles [sw10060]
  • Environment (VSE) developed for the German Information Security Agency. For this pursose, KIV was integrated...
  • HMQV

  • Referenced in 89 articles [sw02714]
  • designed to achieve a remarkable list of security properties. As a result MQV has been ... next generation cryptography to protect US government information”. One question that has not been settled ... whether the protocol can be proven secure in a rigorous model of key-exchange security...
  • Sharemind

  • Referenced in 16 articles [sw22617]
  • necessary information systems. In this paper, we present a provably secure and efficient general-purpose ... techniques. This is a standard way for securely evaluating functions in a multi-party computation ... practice. The protocols of Sharemind are information-theoretically secure in the honest-but-curious model...
  • Jif

  • Referenced in 19 articles [sw16478]
  • Java information flow. Jif is a security-typed programming language that extends Java with support...
  • caGrid

  • Referenced in 10 articles [sw20965]
  • develop a federation of interoperable research information systems. RESULTS: At the heart of the caBIG ... provide the ability to manage and securely share information and analytic resources, and to spur...
  • gmp

  • Referenced in 289 articles [sw00363]
  • cryptography applications and research, Internet security applications, algebra systems, computational algebra research ... part of the GNU project. For more information about the GNU project, please...
  • Paragon

  • Referenced in 9 articles [sw13306]
  • Paragon for practical programming with information-flow control. Conventional security policies for software applications ... languages are not sufficient to express how information is allowed to flow between resources once ... control -- information flow control -- is needed to manage the end-to-end security properties ... first-class support for static checking of information flow control policies. Paragon policies are specified...
  • TASTY

  • Referenced in 19 articles [sw09865]
  • Tool for Automating Secure Two-partY computations. Secure two-party computation allows two untrusting parties ... revealing no information beyond the outcome. Existing cryptographic compilers can automatically generate secure computation protocols...
  • FLASH

  • Referenced in 47 articles [sw02233]
  • even more careful about it’s security. FLASH and SFLASH have been accepted as submissions ... Integrity, and Encryption), a project within the Information Societies Technology Programme of the European Commission...
  • Fable

  • Referenced in 6 articles [sw23081]
  • security policies, including access control, information flow, provenance, and security automata. We have implemented Fable...
  • FlowFox

  • Referenced in 8 articles [sw37815]
  • general information flow control mechanism for web scripts based on the technique of secure multi ... prototype implementation shows that information flow enforcement based on secure multi-execution can be implemented...
  • Merlin

  • Referenced in 5 articles [sw23076]
  • Merlin: specification inference for explicit information flow problems. The last several years have seen ... tools for finding security violations that are caused by explicit information flow in programs. Much ... approach for automatically inferring explicit information flow specifications from program code. Such specifications greatly reduce ... tools that check for security violations caused by explicit information flow. Beginning with a data...
  • LIFT

  • Referenced in 3 articles [sw20596]
  • Overhead Practical Information Flow Tracking System for Detecting Security Attacks. Computer security is severely threatened ... software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis ... detect a wide range of security attacks. However, current information flow tracking systems ... security attacks without requiring any hardware changes. More specifically, LIFT aggressively eliminates unnecessary dynamic information...
  • HBAC

  • Referenced in 2 articles [sw09882]
  • since the stack does not retain security information on the invoked methods for which execution...
  • SNAKE

  • Referenced in 2 articles [sw21078]
  • Korea-Japan Joint Workshop on Information Security and Cryptology...
  • XM2VTSDB

  • Referenced in 47 articles [sw34437]
  • sequences and a 3d Model. For more information about the database and how to order ... project (Multi Modal Verification for Teleservices and Security applications), a part of the EU ACTS...
  • OCTAVE

  • Referenced in 1 article [sw22129]
  • asset-driven, comprehensive, self-directed security risk evaluation for an organization. The OCTAVE Method ... continuous focus on managing information security risks. The method is a self-directed security evaluation ... people from your business units and information technology (IT) department. While the OCTAVE Method ... understand and implement the self-directed information security risk evaluation in your own organization. This...
  • CoSMed

  • Referenced in 3 articles [sw17453]
  • agenda of formal verification of information-flow security for realistic systems. We present CoSMed...
  • SIFA

  • Referenced in 2 articles [sw01350]
  • describe a tool for analysing information flow in security hardware. It identifies both sub-circuits ... preservation of security as well as the potential for information flow due to hardware failure...