Secure information sharing in social agent interactions using information flow analysis
نویسندگان
چکیده
منابع مشابه
Analysis of Iranian faculty information sharing in social networks: the case of Shahid Chamran University
Purpose. the purpose of this research is to analyze scientific information sharing of Shahid Chamran University of Ahvaz faculty in social networks.Method. This study which is conducted through quantitative and qualitative methods, is an applied research in terms of aim, and is of a descriptive-analytic type in nature. The population included all faculty members of Shahid Chamran Universi...
متن کاملToward Secure and Credible Information Sharing Using Information Supply Chains
Information assurance and information sharing are two contradictory yet important tasks in a distributed and information rich environment. Many reports regarding intelligence failures on preventing the Sep 11’s tragic events challenge the current information technologies that are often segregated for easiness of information assurance and demand systems that better support information sharing re...
متن کاملSharing @ The Edge: Secure Information Sharing
Peer-to-peer (P2P) computing promises to return the World Wide Web to an environment where the edge of the network is as important as the Web servers that have dominated its early years. This paper describes issues associated with P2P computing that must be solved before widespread deployment is possible. The paper presents a P2P solution where services and content are equally secured and can b...
متن کاملPrinciples of Secure Information Flow Analysis
In today's world of the Internet, the WorldWide Web, and Google, information is more accessible than ever before. An unfortunate corollary is that it is harder than ever to protect the privacy of sensitive information. In this paper, we explore a technique called secure information flow analysis. Suppose that some sensitive information is stored on a computer system. How can we prevent it from ...
متن کاملInformation Flow Analysis for Fail-Secure Devices
(2005) Information flow analysis for fail-secure devices. Information security devices must preserve security properties even in the presence of faults. This in turn requires a rigorous evaluation of the system behaviours resulting from component failures, especially how such failures affect information flow. We introduce a compositional method of static analysis for fail-secure behaviour. Our ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Engineering Applications of Artificial Intelligence
سال: 2018
ISSN: 0952-1976
DOI: 10.1016/j.engappai.2018.01.002