UP - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 195
1.
  • RIF: Reactive information f... RIF: Reactive information flow labels
    Kozyri, Elisavet; Schneider, Fred B. Journal of computer security, 01/2020, Letnik: 28, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Restrictions that a reactive information flow (RIF) label imposes on a value are determined by the sequence of operations used to derive that value. This allows declassification, endorsement, and ...
Celotno besedilo

PDF
2.
  • Hyperproperties Hyperproperties
    Clarkson, Michael R.; Schneider, Fred B. Journal of computer security, 01/2010, Letnik: 18, Številka: 6
    Journal Article
    Recenzirano
Celotno besedilo
3.
  • Doctrine for Cybersecurity Doctrine for Cybersecurity
    Mulligan, Deirdre K.; Schneider, Fred B. Daedalus (Cambridge, Mass.), 09/2011, Letnik: 140, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    A succession of doctrines for enhancing cybersecurity has been advocated in the past, including prevention, risk management, and deterrence through accountability. None has proved effective. ...
Celotno besedilo
4.
Celotno besedilo

PDF
5.
Celotno besedilo
6.
  • A COMPUTER SCIENTIST MUSING... A COMPUTER SCIENTIST MUSING ABOUT THE DNC HACK
    Schneider, Fred B. AJIL unbound, 01/2016, Letnik: 110
    Journal Article
    Recenzirano
    Odprti dostop

    Theft of secrets is nothing new. Nor is it new to publicize stolen secrets with hopes of influencing (or instigating) leadership changes in government. So the theft of confidential information being ...
Celotno besedilo

PDF
7.
  • Quantifying information flo... Quantifying information flow with beliefs
    Clarkson, Michael R.; Myers, Andrew C.; Schneider, Fred B. Journal of computer security, 01/2009, Letnik: 17, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    To reason about information flow, a new model is developed that describes how attacker beliefs change due to the attacker's observation of the execution of a probabilistic (or deterministic) program. ...
Celotno besedilo

PDF
8.
Celotno besedilo

PDF
9.
  • Omni-Kernel: An Operating S... Omni-Kernel: An Operating System Architecture for Pervasive Monitoring and Scheduling
    Kvalnes, Age; Johansen, Dag; van Renesse, Robbert ... IEEE transactions on parallel and distributed systems, 2015-Oct.-1, 2015-10-1, 20151001, Letnik: 26, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    The omni-kernel architecture is designed around pervasive monitoring and scheduling. Motivated by new requirements in virtualized environments, this architecture ensures that all resource consumption ...
Celotno besedilo

PDF
10.
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 195

Nalaganje filtrov