Sensitive security information

Results: 1968



#Item
1

Timing-Sensitive Information Flow Analysis for Synchronous Systems Boris K¨opf and David Basin Information Security ETH Zurich, Switzerland {bkoepf,basin}@inf.ethz.ch

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2010-09-02 11:11:48
    2

    Impossibility of Precise and Sound Termination Sensitive Security Enforcements Anonymous Author(s) Abstract—An information flow policy is termination sensitive if it imposes that the termination behavior of programs is

    Add to Reading List

    Source URL: www-sop.inria.fr

    Language: English - Date: 2018-03-27 09:23:29
      3

      Technical Report No. 526 Timing-Sensitive Information Flow Analysis for Synchronous Systems Boris K¨opf and David Basin Information Security ETH Zurich, Switzerland

      Add to Reading List

      Source URL: software.imdea.org

      Language: English - Date: 2010-09-02 11:11:48
        4

        2011 IEEE Symposium on Security and Privacy Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach Vineeth Kashyap

        Add to Reading List

        Source URL: oaklandsok.github.io

        Language: English - Date: 2018-03-14 15:33:55
          5

          Protect, encrypt or delete sensitive personal information and contacts on your filming device in case it’s confiscated. Complete a security assessment to protect yourself and those you are filming.

          Add to Reading List

          Source URL: librarywebfiles.s3.amazonaws.com

          - Date: 2015-06-01 11:19:28
            6

            GAO-16-194T, Information Security: Federal Agencies Need to Better Protect Sensitive Data

            Add to Reading List

            Source URL: www.gao.gov

            - Date: 2015-11-17 10:05:18
              7Privacy / Identity documents / Identity management / Data security / Law / Personally identifiable information / Internet privacy / Information privacy / REAL ID Act / Anonymity / Medical privacy / Pseudonym

              Unlinking Private Data Alex VaynbergYale University Sensitive Information in the Wired World

              Add to Reading List

              Source URL: zoo.cs.yale.edu

              Language: English - Date: 2006-05-19 11:28:28
              8United States government secrecy / Government / Security / National security / Sensitive Security Information / For Official Use Only / U.S. Customs and Border Protection / United States Department of Homeland Security / Sensitive but unclassified

              DEPARTMENT OF HOMELAND SECURITY

              Add to Reading List

              Source URL: ilw.com

              Language: English - Date: 2012-09-10 14:48:53
              9Identity management / Law / Privacy / Cryptography / Computer security / Digital media

              Sensitive Information in a Wired World Supported by the National Science Foundation under the ITR Program JOAN FEIGENBAUM

              Add to Reading List

              Source URL: cs-www.cs.yale.edu

              Language: English - Date: 2003-12-06 08:26:04
              10Security / Government / United States Department of Homeland Security / Aviation security / Identity documents / Privacy / Aviation in the United States / Computer-Assisted Passenger Prescreening System / Privacy Act / Transportation Security Administration / Sensitive Security Information / Privacy Office of the U.S. Department of Homeland Security

              DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Docket No. DHS/TSAInterim Final Privacy Act Notice

              Add to Reading List

              Source URL: epic.org

              Language: English - Date: 2009-09-07 00:42:07
              UPDATE