Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
The growing dependence of our society and economy on networked information systems makes it essential to protect our confidential data from being leaked by malicious code. Downloading and executing code (possibly from untrusted sources) has become a daily event. Modern operating systems load code fo...
Saved in:
Main Author: | Abdu Muthana, Abdulrahman Ahmad |
---|---|
Format: | Thesis |
Language: | English English |
Published: |
2008
|
Subjects: | |
Online Access: | http://psasir.upm.edu.my/id/eprint/5256/1/FSKTM_2008_20a.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Managing information system security compliance by setting controls over documents /
by: Sathish Kumar Rajaratnam
Published: (2012) -
Information security behavior in organizations : influencing factors and management strategies /
by: Barzak, Omar
Published: (2020) -
Enhancing Security in Mobile IPv6 with Private Key-Based Binding Update Protocol /
by: Modares, Hero -
Enhancement of bluetooth security authentication using Hash-Based Message Authentication Code (HMAC) algorithm /
by: Saliou, Diallo Alhassane
Published: (2015) -
A key management framework for secure group communication in wireless mobile environments /
by: Miss Laiha Mat Kiah
Published: (2007)