Filters








816,357 Hits in 6.5 sec

Abstract Certification of Global Non-interference in Rewriting Logic [chapter]

Mauricio Alba-Castro, María Alpuente, Santiago Escobar
2010 Lecture Notes in Computer Science  
In order to achieve a finite state transition system, we develop an abstract Java semantics that we use for secure and effective non-interference Java analysis.  ...  We also propose a certification technique for global non-interference of complete Java classes based on rewriting logic, a very general logical and semantic framework that is efficiently implemented in  ...  In contrast to [2] where local non-interference was studied, here we consider global non-interference (i.e., we are able to ensure a non-interference policy at the final state of the whole Java program  ... 
doi:10.1007/978-3-642-17071-3_6 fatcat:ramltoqfmbfovjadgkri3pvr2a

Abstract interpretation-based approaches to Security - A Survey on Abstract Non-Interference and its Challenging Applications

Isabella Mastroeni
2013 Electronic Proceedings in Theoretical Computer Science  
of a non-interference policy.  ...  Finally, we consider two challenging research fields concerning security where abstract non-interference seems a promising approach providing new perspectives and new solutions to open problems: Code injection  ...  I would like to thank Dave Schmidt for the time he dedicated to me during my postdoc in Manhattan and for being so inspiring for the research I developed since then.  ... 
doi:10.4204/eptcs.129.4 fatcat:ijzdyl5hcvebjdozaxl5t77oeu

A Q-Learning-based Approach for Distributed Beam Scheduling in mmWave Networks [article]

Xiang Zhang, Shamik Sarkar, Arupjyoti Bhuyan, Sneha Kumar Kasera, Mingyue Ji
2021 arXiv   pre-print
As a baseline, we compare the proposed approach to the state-of-the-art non-cooperative game-based approach which was previously developed for the same problem.  ...  Experiment results show that the proposed approach adapts well to different interference situations by learning from experience and can achieve higher payoff than the game-based approach.  ...  We compare the proposed approach with our, state-of-the-art, non-cooperative game-based approach [9] and demonstrate that the our learning approach adapts well to different interference situations and  ... 
arXiv:2110.08704v1 fatcat:pmf53jyt7bh7vg6sb6fffqg67u

Automatic Information Flow Analysis of Business Process Models [chapter]

Rafael Accorsi, Andreas Lehmann
2012 Lecture Notes in Computer Science  
Building on the concept of Place-based Non-Interference, the novelty is that Petri net reachability is employed to detect places in which information leaks occur.  ...  We show that the approach is sound and complete, and present its implementation, the Anica tool. Anica employs state of the art modelchecking algorithms to test reachability.  ...  Section 3 presents the approach to detect non-interference based on reachability, and shows its main properties. Section 4 introduces Anica and Sect. 5 presents its evaluation.  ... 
doi:10.1007/978-3-642-32885-5_13 fatcat:hs3le67s2vg3rkpwnxf5bdhb7y

EffectiveAdvice

Bruno C. d. S. Oliveira, Tom Schrijvers, William R. Cook
2010 Proceedings of the Eighth International Conference on Aspect-Oriented Software Development - AOSD '10  
The result is an effective semantic model of advice that supports effects, and allows these effects to be separated with strong non-interference guarantees, or merged as needed.  ...  Advice is a mechanism, widely used in aspect-oriented languages, that allows one program component to augment or modify the behavior of other components.  ...  Orthogonal data flow interference cannot be enforced, and it is not clear how non-stateful effects like exceptions fit in their approach.  ... 
doi:10.1145/1739230.1739244 dblp:conf/aosd/OliveiraSC10 fatcat:pnojoq4ljva35nipfmabwefn74

Abstract Certification of Global Non-Interference in Rewriting Logic [article]

Mauricio Alba-Castro, and Santiago Escobar ELP-DSIC, U. Politécnica de Valencia, Spain. alpuente,sescobar@dsic.upv.es. U. Autónoma de Manizales, Colombia. malba@autonoma.edu.co)
2010 arXiv   pre-print
In order to achieve a finite state transition system, we develop an abstract Java semantics that we use for secure and effective non-interference Java analysis.  ...  We also propose a certification technique for global non-interference of complete Java classes based on rewriting logic, a very general logical and semantic framework that is efficiently implemented in  ...  In contrast to [2] where local non-interference was studied, here we consider global non-interference (i.e., we are able to ensure a non-interference policy at the final state of the whole Java program  ... 
arXiv:1006.4304v1 fatcat:acvkz35d7jewfmbm6sfkiihswa

Opportunistic Spectrum Sharing Schemes for CDMA-Based Uplink MAC in Cognitive Radio Networks

Xi Zhang, Hang Su
2011 IEEE Journal on Selected Areas in Communications  
Under our proposed schemes, the SUs can adaptively select between the intrusive spectrum sharing and the non-intrusive spectrum sharing operations to transmit data to SBS based on the channel utilization  ...  We consider a wireless cognitive radio network in which a set of secondary users (SUs) opportunistically utilize the wireless spectrum licensed to the primary users (PUs) to transmit packets to the secondary  ...  The solution to P2 also lies on the boundary determined by the constraints. We can use a feasible-directions-based method [28] to solve the non-convex optimization problem of P2.  ... 
doi:10.1109/jsac.2011.110405 fatcat:orec2pbuubaptkt5go6nmusbtu

Two Liberal Models of Cultural Prulazim

TOK Nafiz
2003 Ankara Üniversitesi SBF Dergisi  
The liberal non-interference model, which is based on an idea of toleration within the limits of the Harm Principle. and the liberal non-discrimination model, which is based on an idea of state neııtrality  ...  This paper discusses whether the traditional liberal policies of non-interference and non-discrimination are sufficient to properiy deal with ıhese recem cultural demands.  ...  The non-interference approach aecepts the state and culture relationship.  ... 
doi:10.1501/sbfder_0000001696 fatcat:ucqz7zhhzbautbho4ka2cuif2i

Model-Driven Information Flow Security for Component-Based Systems [chapter]

Najah Ben Said, Takoua Abdellatif, Saddek Bensalem, Marius Bozga
2014 Lecture Notes in Computer Science  
This paper proposes a framework for information flow security in component-based systems which follows the model-driven security approach.  ...  The benefit of the approach is illustrated through an application to secure heterogeneous distributed systems.  ...  Non-interference properties have been already studied using different model-based approaches.  ... 
doi:10.1007/978-3-642-54848-2_1 fatcat:b6tztyjtejfitp2ub5or7pxl3a

MRI: Modular reasoning about interference in incremental programming

BRUNO C. D. S. OLIVEIRA, TOM SCHRIJVERS, WILLIAM R. COOK
2012 Journal of functional programming  
MRI formally captures harmlessness, a hard-to-formalize notion in the interference literature, in two theorems.  ...  This makes reasoning about IP mechanisms a notoriously hard problem: modular reasoning about a component becomes very difficult; and it is very hard to tell if two tightly coupled components interfere  ...  Wang, and the anonymous reviewers for their useful comments; and to Andres Löh for supporting lhs2tex.  ... 
doi:10.1017/s0956796812000354 fatcat:5anvmvkn2ja43iyqrhvwwvuwta

Information leak detection in business process models: Theory, application, and tool support

Rafael Accorsi, Andreas Lehmann, Niels Lohmann
2015 Information Systems  
Such a feature allows for the use of state-of-the-art tool support to model-check business process models and detect leaks.  ...  This motivates a tight integration of business process modeling and non-interference checking. $ Extended and thoroughly revised version of [1].  ...  The place-based non-interference (PBNI) [13] is an approach to reason about structural non-interference in Petri nets.  ... 
doi:10.1016/j.is.2013.12.006 fatcat:ev25aru23zeltpr6gb52pkq63i

Leveraging surrounding context for scene text detection

Yao Li, Chunhua Shen, Wenjing Jia, Anton van den Hengel
2013 2013 IEEE International Conference on Image Processing  
In this paper, we attempt to solve this problem from a different prospective. We show that characters and non-character interferences are separable by leveraging the surrounding context.  ...  Finding text in natural images has been a challenging task in vision. At the core of state-of-the-art scene text detection algorithms are a set of text-specific features within extracted regions.  ...  To address this problem, texture-based and hybrid approaches extract features to train a classifier (e.g. SVM, AdaBoost).  ... 
doi:10.1109/icip.2013.6738467 dblp:conf/icip/LiSJH13 fatcat:jsbd2ksq3nhpnh44jr7srtzefe

Line Parameters and Transients of a Non-Parallel Conductors System

A. Ametani, M. Aoki
1989 IEEE Power Engineering Review  
Transient EMI as well as steady-state RI and TVI measurements were made at the Arnott station of B.C. Hydro and Chateauguay station of Hydro-Qu6bec.  ...  , produce transient EMI but their repetition at a rate of a few hundred per second gives rise to steady-state radio interference (RI) and television interference (TVI) similar to that produced by automobile  ...  The result by model B 10 are observed to agree well with that by model Al0. Thus, model B10 which is based on the GMD approach gives a fairly good accuracy.  ... 
doi:10.1109/mper.1989.4310611 fatcat:xas7ayqle5adneoyd3buy6jzae

New models of cache architectures characterizing information leakage from cache side channels

Tianwei Zhang, Ruby B. Lee
2014 Proceedings of the 30th Annual Computer Security Applications Conference on - ACSAC '14  
In this paper, we propose a novel method to evaluate a system's vulnerability to side-channel attacks. We establish side-channel leakage models based on the non-interference property.  ...  Then we define how the security aspects of a cache architecture can be modeled as a finite-state machine (FSM) with state transitions that cause interference.  ...  For now, it suffices to say that it is a new output generated for the cache state machine that counts state transitions that violate the non-interference property.  ... 
doi:10.1145/2664243.2664273 dblp:conf/acsac/ZhangL14 fatcat:b5bdogfuejcwfoesfbdxqgl4mu

Direct interference suppression in EEG/MEG dipole source localization

Shun Chi Wu, A L Swindlehurst, Yu Chen Yao
2010 2010 IEEE International Conference on Acoustics, Speech and Signal Processing  
Rather than using the standard prewhitening approach, the proposed algorithm attempts to directly null interference using a projection operator obtained from a set of secondary, control-state data.  ...  The use of direct interference cancellation is shown to be significantly more robust than prewhitening, due to the elimination of the need for computing covariance matrices, and the relaxation of the assumption  ...  Results and Discussion To compare the performance of the proposed interference suppression approach with the existing prewhitening based approach, a simple simulation study was conducted.  ... 
doi:10.1109/icassp.2010.5495573 dblp:conf/icassp/WuSY10 fatcat:4yrfamjn2rgsto7suhlo5yveqe
« Previous Showing results 1 — 15 out of 816,357 results