Information Flow Analysis for Fail-Secure Devices

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Flow Analysis for Fail-Secure Devices

(2005) Information flow analysis for fail-secure devices. Information security devices must preserve security properties even in the presence of faults. This in turn requires a rigorous evaluation of the system behaviours resulting from component failures, especially how such failures affect information flow. We introduce a compositional method of static analysis for fail-secure behaviour. Our ...

متن کامل

Principles of Secure Information Flow Analysis

In today's world of the Internet, the WorldWide Web, and Google, information is more accessible than ever before. An unfortunate corollary is that it is harder than ever to protect the privacy of sensitive information. In this paper, we explore a technique called secure information flow analysis. Suppose that some sensitive information is stored on a computer system. How can we prevent it from ...

متن کامل

Arrows for secure information flow

This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful information-flow control mechanisms including dynamic security lattices, run-time code privileges and declassification all without modifying the base language. This design avoids the redundant work of producing new languages, l...

متن کامل

Secure Personal Information Management for Mobile Devices

More than six decades after Vannevar Bush put forward Memex [3], his vision of a personal information management (PIM) framework, most computer users are still constrained by a rigid hierarchical file organization, where the semantic relationships among data are not emphasized. The semantic desktop leverages the potential of the semantic web to address the challenges of complex PI spaces, which...

متن کامل

Java Bytecode Dependence Analysis for Secure Information Flow

Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Information flow policy can ensure data confidentiality, however, conventional information flow analysis mainly focused on the programs written in high-level programming languages and is generally performed by type checking ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Computer Journal

سال: 2005

ISSN: 0010-4620,1460-2067

DOI: 10.1093/comjnl/bxh056