Cryptographic information protection in distributed control systems
نویسندگان
چکیده
منابع مشابه
Partial Observation in Distributed Supervisory Control of Discrete-Event Systems
Distributed supervisory control is a method to synthesize local controllers in discrete-eventsystems with a systematic observation of the plant. Some works were reported on extending this methodby which local controllers are constructed so that observation properties are preserved from monolithic todistributed supervisory control, in an up-down approach. In this paper, we find circumstances in ...
متن کاملInformation Flow Control in Distributed Systems
J,;6%7%9%F%‘$K$*$1$k>pJsN.@)8f 0BED >;;K N)@n 7I9T BlBt @? El5~EE5!Bg3XM}9)3XIt7P1D9)3X2J J,;61~MQ$O!"J#?t$N%*%V%8%’%/%H$+$i$J$k%0%k!<%W$,DL?.LV$rDL$8$F%a%C%;!<%8$N8r49$r9T$&$3$H$G]7?A‘:n1i;;$NBP$K$h$jI=8=$5$l!"%*%V%8%’%/%H$K$h$jDs6!$5$l$kA‘ 1i;;$rDL$7$F$N$_A‘:n$9$k$3$H$,$G$-$k!#$^$?!"A‘:n1i;;$O$5$i$KB>$N%*%V%8%’%/%H$,Ds6!$9$kA‘:n1i;;$r $S=P$9$3$H$,$"$k...
متن کاملProtection and Resource Control in Distributed Operating Systems
Local networks often consist of a cable snaking through a building with sockets in each room into which users can plug their personal computers. Using such a network for building a coherent distributed or network operating system is difficult because the system administrators have no control over the users' machines-not the applications programs, not the system kernel, not even the choice of ha...
متن کاملSecuring Distributed Systems with Information Flow Control
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DIFC to the network. We present DStar, a system that enforces the security requirements of mutually distrustful components through cryptography on the network and local OS protection mechanisms on each host. DStar does n...
متن کاملQuantifying information flow in cryptographic systems
We provide a novel definition of quantitative information flow, called transmissible information, that is suitable for reasoning about informational-theoretically secure (or non-cryptographic) systems, as well as about cryptographic systems with their polynomially bounded adversaries, error probabilities, etc. Transmissible information captures deliberate communication between two processes, an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science intensive technologies in mechanical engineering
سال: 2019
ISSN: 2223-4608
DOI: 10.30987/article_5c12914778c424.41687441