Results 241 to 250 of about 4,354,998 (290)
Cold-inducible RNA binding protein ameliorates oxygen-glucose deprivation-induced hippocampal neuron injury through anti-apoptotic and anti-oxidative pathways. [PDF]
Chen L +6 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Control flow obfuscation with information flow tracking
Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture, 2009Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is usually referred to as information flow tracking, has been widely applied to secure software execution (e.g., taint tracking), protect software privacy and improve performance ...
Haibo Chen 0001 +5 more
openaire +1 more source
Specifying Information-Flow Controls
25th IEEE International Conference on Distributed Computing Systems Workshops, 2005The core problem in risk analysis - determining exploitable paths between attackers and system assets - is essentially a problem of determining information flow. It is relatively straightforward to interpret design models for service-based distributed systems in information-flow terms, but the analysis results must be integrated into the system ...
Howard Chivers, Jeremy Jacob
openaire +1 more source
An information flow control meta-model
Proceedings of the 18th ACM symposium on Access control models and technologies, 2013In this paper a meta-model for information flow control is defined using the foundation of Barker's access control meta-model. The purposes for defining this meta-model is to achieve a more principled understanding of information flow control, to compare information flow control and access control at an abstract level, and to explore how information ...
Dennis G. Kafura, Denis Gracanin
openaire +1 more source
A decentralized model for information flow control
ACM SIGOPS Operating Systems Review, 1997This paper presents a new model for controlling information flo w in systems with mutual distrust and decentralized authority. The model allows users to share information with distrusted code (e.g., downloaded applets), yet still control how that code disseminates the shared information to others.
Andrew C. Myers, Barbara Liskov
openaire +1 more source
Parametric information flow control in ehealth
2015 17th International Conference on E-health Networking, Application & Services (HealthCom), 2015We study the problem of enforcing information flow control (IFC) in ehealth systems to verify secure flow of information through programs. IFC mechanisms allow users to control the release and propagation of sensitive information so that confidential information is not observable to unintended principals while collaborating with other legitimate ...
Chandrika Bhardwaj, Sanjiva Prasad
openaire +1 more source
Differential privacy with information flow control
Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security, 2011We investigate the integration of two approaches to information security: information flow analysis, in which the dependence between secret inputs and public outputs is tracked through a program, and differential privacy, in which a weak dependence between input and output is permitted but provided only through a relatively small set of known ...
Arnar Birgisson +2 more
openaire +1 more source
On Formalizing Information-Flow Control Libraries
Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, 2016Many state-of-the-art IFC libraries support a variety of advanced features like mutuable data structures, exceptions, and concurrency, whose subtle interaction makes verification of security guarantees challenging. In this paper, we present a full-fledged, mechanically-verified model of MAC---a statically enforced IFC library.
Marco Vassena, Alejandro Russo
openaire +1 more source
LOCKING PROTOCOL FOR INFORMATION FLOW CONTROL
Journal of Interconnection Networks, 2004We discuss a novel role locking protocol (RLP) to prevent illegal information flow among objects in a role-based access control (RBAC) model. In this paper, we define a conflicting relation among roles "a role R1 conflicts with another role R2" to show that illegal information flow may occur if a transaction associated with role R1 is performed before
Ryung Chon +3 more
openaire +1 more source

