A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
Abstract Certification of Global Non-interference in Rewriting Logic
[chapter]
2010
Lecture Notes in Computer Science
In order to achieve a finite state transition system, we develop an abstract Java semantics that we use for secure and effective non-interference Java analysis. ...
We also propose a certification technique for global non-interference of complete Java classes based on rewriting logic, a very general logical and semantic framework that is efficiently implemented in ...
In contrast to [2] where local non-interference was studied, here we consider global non-interference (i.e., we are able to ensure a non-interference policy at the final state of the whole Java program ...
doi:10.1007/978-3-642-17071-3_6
fatcat:ramltoqfmbfovjadgkri3pvr2a
Abstract interpretation-based approaches to Security - A Survey on Abstract Non-Interference and its Challenging Applications
2013
Electronic Proceedings in Theoretical Computer Science
of a non-interference policy. ...
Finally, we consider two challenging research fields concerning security where abstract non-interference seems a promising approach providing new perspectives and new solutions to open problems: Code injection ...
I would like to thank Dave Schmidt for the time he dedicated to me during my postdoc in Manhattan and for being so inspiring for the research I developed since then. ...
doi:10.4204/eptcs.129.4
fatcat:ijzdyl5hcvebjdozaxl5t77oeu
A Q-Learning-based Approach for Distributed Beam Scheduling in mmWave Networks
[article]
2021
arXiv
pre-print
As a baseline, we compare the proposed approach to the state-of-the-art non-cooperative game-based approach which was previously developed for the same problem. ...
Experiment results show that the proposed approach adapts well to different interference situations by learning from experience and can achieve higher payoff than the game-based approach. ...
We compare the proposed approach with our, state-of-the-art, non-cooperative game-based approach [9] and demonstrate that the our learning approach adapts well to different interference situations and ...
arXiv:2110.08704v1
fatcat:pmf53jyt7bh7vg6sb6fffqg67u
Automatic Information Flow Analysis of Business Process Models
[chapter]
2012
Lecture Notes in Computer Science
Building on the concept of Place-based Non-Interference, the novelty is that Petri net reachability is employed to detect places in which information leaks occur. ...
We show that the approach is sound and complete, and present its implementation, the Anica tool. Anica employs state of the art modelchecking algorithms to test reachability. ...
Section 3 presents the approach to detect non-interference based on reachability, and shows its main properties. Section 4 introduces Anica and Sect. 5 presents its evaluation. ...
doi:10.1007/978-3-642-32885-5_13
fatcat:hs3le67s2vg3rkpwnxf5bdhb7y
EffectiveAdvice
2010
Proceedings of the Eighth International Conference on Aspect-Oriented Software Development - AOSD '10
The result is an effective semantic model of advice that supports effects, and allows these effects to be separated with strong non-interference guarantees, or merged as needed. ...
Advice is a mechanism, widely used in aspect-oriented languages, that allows one program component to augment or modify the behavior of other components. ...
Orthogonal data flow interference cannot be enforced, and it is not clear how non-stateful effects like exceptions fit in their approach. ...
doi:10.1145/1739230.1739244
dblp:conf/aosd/OliveiraSC10
fatcat:pnojoq4ljva35nipfmabwefn74
Abstract Certification of Global Non-Interference in Rewriting Logic
[article]
2010
arXiv
pre-print
In order to achieve a finite state transition system, we develop an abstract Java semantics that we use for secure and effective non-interference Java analysis. ...
We also propose a certification technique for global non-interference of complete Java classes based on rewriting logic, a very general logical and semantic framework that is efficiently implemented in ...
In contrast to [2] where local non-interference was studied, here we consider global non-interference (i.e., we are able to ensure a non-interference policy at the final state of the whole Java program ...
arXiv:1006.4304v1
fatcat:acvkz35d7jewfmbm6sfkiihswa
Opportunistic Spectrum Sharing Schemes for CDMA-Based Uplink MAC in Cognitive Radio Networks
2011
IEEE Journal on Selected Areas in Communications
Under our proposed schemes, the SUs can adaptively select between the intrusive spectrum sharing and the non-intrusive spectrum sharing operations to transmit data to SBS based on the channel utilization ...
We consider a wireless cognitive radio network in which a set of secondary users (SUs) opportunistically utilize the wireless spectrum licensed to the primary users (PUs) to transmit packets to the secondary ...
The solution to P2 also lies on the boundary determined by the constraints. We can use a feasible-directions-based method [28] to solve the non-convex optimization problem of P2. ...
doi:10.1109/jsac.2011.110405
fatcat:orec2pbuubaptkt5go6nmusbtu
Two Liberal Models of Cultural Prulazim
2003
Ankara Üniversitesi SBF Dergisi
The liberal non-interference model, which is based on an idea of toleration within the limits of the Harm Principle. and the liberal non-discrimination model, which is based on an idea of state neııtrality ...
This paper discusses whether the traditional liberal policies of non-interference and non-discrimination are sufficient to properiy deal with ıhese recem cultural demands. ...
The non-interference approach aecepts the state and culture relationship. ...
doi:10.1501/sbfder_0000001696
fatcat:ucqz7zhhzbautbho4ka2cuif2i
Model-Driven Information Flow Security for Component-Based Systems
[chapter]
2014
Lecture Notes in Computer Science
This paper proposes a framework for information flow security in component-based systems which follows the model-driven security approach. ...
The benefit of the approach is illustrated through an application to secure heterogeneous distributed systems. ...
Non-interference properties have been already studied using different model-based approaches. ...
doi:10.1007/978-3-642-54848-2_1
fatcat:b6tztyjtejfitp2ub5or7pxl3a
MRI: Modular reasoning about interference in incremental programming
2012
Journal of functional programming
MRI formally captures harmlessness, a hard-to-formalize notion in the interference literature, in two theorems. ...
This makes reasoning about IP mechanisms a notoriously hard problem: modular reasoning about a component becomes very difficult; and it is very hard to tell if two tightly coupled components interfere ...
Wang, and the anonymous reviewers for their useful comments; and to Andres Löh for supporting lhs2tex. ...
doi:10.1017/s0956796812000354
fatcat:5anvmvkn2ja43iyqrhvwwvuwta
Information leak detection in business process models: Theory, application, and tool support
2015
Information Systems
Such a feature allows for the use of state-of-the-art tool support to model-check business process models and detect leaks. ...
This motivates a tight integration of business process modeling and non-interference checking. $ Extended and thoroughly revised version of [1]. ...
The place-based non-interference (PBNI) [13] is an approach to reason about structural non-interference in Petri nets. ...
doi:10.1016/j.is.2013.12.006
fatcat:ev25aru23zeltpr6gb52pkq63i
Leveraging surrounding context for scene text detection
2013
2013 IEEE International Conference on Image Processing
In this paper, we attempt to solve this problem from a different prospective. We show that characters and non-character interferences are separable by leveraging the surrounding context. ...
Finding text in natural images has been a challenging task in vision. At the core of state-of-the-art scene text detection algorithms are a set of text-specific features within extracted regions. ...
To address this problem, texture-based and hybrid approaches extract features to train a classifier (e.g. SVM, AdaBoost). ...
doi:10.1109/icip.2013.6738467
dblp:conf/icip/LiSJH13
fatcat:jsbd2ksq3nhpnh44jr7srtzefe
Line Parameters and Transients of a Non-Parallel Conductors System
1989
IEEE Power Engineering Review
Transient EMI as well as steady-state RI and TVI measurements were made at the Arnott station of B.C. Hydro and Chateauguay station of Hydro-Qu6bec. ...
, produce transient EMI but their repetition at a rate of a few hundred per second gives rise to steady-state radio interference (RI) and television interference (TVI) similar to that produced by automobile ...
The result by model B 10 are observed to agree well with that by model Al0. Thus, model B10 which is based on the GMD approach gives a fairly good accuracy. ...
doi:10.1109/mper.1989.4310611
fatcat:xas7ayqle5adneoyd3buy6jzae
New models of cache architectures characterizing information leakage from cache side channels
2014
Proceedings of the 30th Annual Computer Security Applications Conference on - ACSAC '14
In this paper, we propose a novel method to evaluate a system's vulnerability to side-channel attacks. We establish side-channel leakage models based on the non-interference property. ...
Then we define how the security aspects of a cache architecture can be modeled as a finite-state machine (FSM) with state transitions that cause interference. ...
For now, it suffices to say that it is a new output generated for the cache state machine that counts state transitions that violate the non-interference property. ...
doi:10.1145/2664243.2664273
dblp:conf/acsac/ZhangL14
fatcat:b5bdogfuejcwfoesfbdxqgl4mu
Direct interference suppression in EEG/MEG dipole source localization
2010
2010 IEEE International Conference on Acoustics, Speech and Signal Processing
Rather than using the standard prewhitening approach, the proposed algorithm attempts to directly null interference using a projection operator obtained from a set of secondary, control-state data. ...
The use of direct interference cancellation is shown to be significantly more robust than prewhitening, due to the elimination of the need for computing covariance matrices, and the relaxation of the assumption ...
Results and Discussion To compare the performance of the proposed interference suppression approach with the existing prewhitening based approach, a simple simulation study was conducted. ...
doi:10.1109/icassp.2010.5495573
dblp:conf/icassp/WuSY10
fatcat:4yrfamjn2rgsto7suhlo5yveqe
« Previous
Showing results 1 — 15 out of 816,357 results