Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Information Flow Control
biblio
Gradual Security Types and Gradual Guarantees
Submitted by grigby1 on Fri, 08/12/2022 - 2:09pm
Monitoring
pubcrawl
Resiliency
composability
Runtime
computer security
Metrics
Semantics
noninterference
compiler security
Refining
annotations
gradual guarantees
gradual typing
Information Flow Control
biblio
A Generalized Notion of Non-interference for Flow Security of Sequential and Concurrent Programs
Submitted by aekwall on Tue, 06/01/2021 - 1:20pm
programming
security
pubcrawl
composability
software engineering
Lattices
Writing
Semantics
Compositionality
Information Flow Control
Concurrent computing
concurrent
Generalization
non-interference
Programming Language
sequential
biblio
Nontransitive Security Types for Coarse-grained Information Flow Control
Submitted by grigby1 on Thu, 04/29/2021 - 2:16pm
Labeling
type systems
Software
security types
security policies
policy-based governance
noninterference
Lattices
language-based security
object oriented security
Information Flow Control
History
computer security
Computer languages
pubcrawl
Metrics
composability
Resiliency
biblio
Transparent IFC Enforcement: Possibility and (In)Efficiency Results
Submitted by grigby1 on Thu, 03/04/2021 - 2:34pm
security lattice
programming languages
pubcrawl
real-world programs
resilience
Resiliency
Runtime
secure information flow control
Secure Multi-Execution
secure programs
security condition
polynomial time
security of data
Semantics
SME family
termination insensitive noninterference
third-party systems
transparency
transparent enforcement
transparent IFC enforcement
white-box
FlowFox browser
white box
security
black-box
black-box enforcement
Browsers
composability
computational complexity
Computer languages
efficiency
faceted secure multiexecution
White Box Security
FSME
IFC community
Information Flow Control
Lattices
memory overhead
Metrics
Multiple Facets
no-write-down no-read-up style security policy
noninterference
biblio
Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
row-level security checks
policy-based governance
pubcrawl
relational database security
relational databases
Resiliency
Routing
routing configuration
Row-Level Security
Policy Based Governance
security
security of data
security policies
Software Defined Network
software defined networking
software-defined networking
standards
Structured Query Language
Human behavior
collaboration
composability
computer networks
database management systems
database tables
database-defined network
Database-Defined Networking
fine-grained security policies
business requirements
Information Flow Control
Metrics
multilevel security
multilevel security policies
network configuration
network hardware administration
network topology
biblio
Information Flow Control for Distributed Trusted Execution Environments
Submitted by aekwall on Mon, 01/20/2020 - 11:45am
encryption
untrusted host
Trusted Computing
TEE
Resiliency
pubcrawl
Protocols
Predictive Metrics
messages authentication
Libraries
information-flow-control
Information Flow Control
high-level abstractions
high-integrity messages
Fabrics
encryption audits
-distributed-systems
distributed trusted execution environments
distributed programming
DFLATE
data integrity
Cryptography
cryptographic mechanisms
core security calculus
confidential messages
Compositionality
Calculus
-trusted-execution-environment
-security
-language-based-security
-enclaves
biblio
LUCON: Data Flow Control for Message-Based IoT Systems
Submitted by grigby1 on Thu, 02/14/2019 - 11:20am
message-based IoT systems
usage control mechanisms
usage control
Temperature measurement
taint analysis
sensors
Semantics
Runtime
real-world IoT middleware
pubcrawl
process control
private data
policy enforcement
personal information
middleware
Metrics
Access Control
message routes
LUCON policies
IoT applications
Internet of Things
information leaks
Information Flow Control
Industrial Internet of Things
distributed systems
data-centric security policy framework
data privacy
data flows
data flow control
computer network security
composability
authorisation
file
Cross-App Poisoning in Software-Defined Networking
Submitted by awhitesell on Mon, 10/15/2018 - 1:34pm
data provenance
Information Flow Control
network operating system
software-defined networking
UIUC
NSA SoS Lablets Materials
Policy-Governed Secure Collaboration
UIUC
Monitoring, Fusion, and Response for Cyber Resilience
biblio
Cross-App Poisoning in Software-Defined Networking
Submitted by awhitesell on Mon, 10/15/2018 - 1:34pm
data provenance
Information Flow Control
network operating system
software-defined networking
UIUC
NSA SoS Lablets Materials
Policy-Governed Secure Collaboration
UIUC
Policy-Governed Secure Collaboration
UIUC
Monitoring, Fusion, and Response for Cyber Resilience
biblio
Using VisorFlow to Control Information Flow Without Modifying the Operating System Kernel or Its Userspace
Submitted by grigby1 on Mon, 03/26/2018 - 12:57pm
composability
Information Flow Control
Metrics
pubcrawl
resilience
Resiliency
security
virtual-machine introspection
Windows operating system
1
2
next ›
last »