Sensitive Security Information

Results: 1968



#Item
1Timing-Sensitive Information Flow Analysis for Synchronous Systems Boris K¨opf and David Basin Information Security ETH Zurich, Switzerland {bkoepf,basin}@inf.ethz.ch

Timing-Sensitive Information Flow Analysis for Synchronous Systems Boris K¨opf and David Basin Information Security ETH Zurich, Switzerland {bkoepf,basin}@inf.ethz.ch

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2010-09-02 11:11:48
    2Impossibility of Precise and Sound Termination Sensitive Security Enforcements Anonymous Author(s) Abstract—An information flow policy is termination sensitive if it imposes that the termination behavior of programs is

    Impossibility of Precise and Sound Termination Sensitive Security Enforcements Anonymous Author(s) Abstract—An information flow policy is termination sensitive if it imposes that the termination behavior of programs is

    Add to Reading List

    Source URL: www-sop.inria.fr

    Language: English - Date: 2018-03-27 09:23:29
      3Technical Report No. 526 Timing-Sensitive Information Flow Analysis for Synchronous Systems Boris K¨opf and David Basin Information Security ETH Zurich, Switzerland

      Technical Report No. 526 Timing-Sensitive Information Flow Analysis for Synchronous Systems Boris K¨opf and David Basin Information Security ETH Zurich, Switzerland

      Add to Reading List

      Source URL: software.imdea.org

      Language: English - Date: 2010-09-02 11:11:48
        42011 IEEE Symposium on Security and Privacy  Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach  Vineeth Kashyap

        2011 IEEE Symposium on Security and Privacy Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach Vineeth Kashyap

        Add to Reading List

        Source URL: oaklandsok.github.io

        Language: English - Date: 2018-03-14 15:33:55
          5Protect, encrypt or delete sensitive personal information and contacts on your filming device in case it’s confiscated. Complete a security assessment to protect yourself and those you are filming.

          Protect, encrypt or delete sensitive personal information and contacts on your filming device in case it’s confiscated. Complete a security assessment to protect yourself and those you are filming.

          Add to Reading List

          Source URL: librarywebfiles.s3.amazonaws.com

          - Date: 2015-06-01 11:19:28
            6GAO-16-194T, Information Security: Federal Agencies Need to Better Protect Sensitive Data

            GAO-16-194T, Information Security: Federal Agencies Need to Better Protect Sensitive Data

            Add to Reading List

            Source URL: www.gao.gov

            - Date: 2015-11-17 10:05:18
              7Unlinking Private Data Alex VaynbergYale University Sensitive Information in the Wired World

              Unlinking Private Data Alex VaynbergYale University Sensitive Information in the Wired World

              Add to Reading List

              Source URL: zoo.cs.yale.edu

              Language: English - Date: 2006-05-19 11:28:28
              8DEPARTMENT OF HOMELAND SECURITY

              DEPARTMENT OF HOMELAND SECURITY

              Add to Reading List

              Source URL: ilw.com

              Language: English - Date: 2012-09-10 14:48:53
              9Sensitive Information in a Wired World Supported by the National Science Foundation under the ITR Program  JOAN FEIGENBAUM

              Sensitive Information in a Wired World Supported by the National Science Foundation under the ITR Program JOAN FEIGENBAUM

              Add to Reading List

              Source URL: cs-www.cs.yale.edu

              Language: English - Date: 2003-12-06 08:26:04
              10DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Docket No. DHS/TSAInterim Final Privacy Act Notice

              DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Docket No. DHS/TSAInterim Final Privacy Act Notice

              Add to Reading List

              Source URL: epic.org

              Language: English - Date: 2009-09-07 00:42:07