Alan B. Shaffer

Learn More
Covert channels can result in unauthorized information flows when exploited by malicious software. To address this problem, we present a precise, formal definition for covert channels, which relies on control flow dependency tracing through program execution, and extends Dennings' and subsequent classic work in secure information flow [9][40][30]. A formal(More)
Two-dimensional analysis techniques were applied to breathhold magnetic resonance (MR) tagged images in humans to better understand left ventricular (LV) mechanics 8 weeks after large reperfused first anterior myocardial infarction (MI). Eighteen patients (aged 51 +/- 13 yr, 15 men) were studied 8 +/- 1 weeks after first anterior MI as were 9 volunteers,(More)
Unauthorized information flows can result from malicious software exploiting covert channels and overt flaws in access control design. To address this problem, we present a precise, formal definition for information flow that relies on control flow dependency tracing through program execution, and extends Dennings' and follow-on classic work in secure(More)
The location of the brain's symmetry axis on computerized tomography (CT) images was mathematically formulated. A series of computer programs were written to "peel off" the skull and artifacts external to the skull. Image lines were then tested for right-left symmetry and in each line a pixel was selected which best represented the center of symmetry of the(More)
  • 1