نتایج جستجو برای: information flow control
تعداد نتایج: 2748403 فیلتر نتایج به سال:
We show how security requirements, in particular confidentiality requirements, for a whole multiagent system can formally be decomposed into confidentiality requirements for the agents. The decomposition assumes that there is some control over, or trust in, a subset of the agents and that the platform is trusted to satisfy certain reasonable assumptions. It is generic over the internal executio...
We revisit the classical notion of noninterference for statebased systems, as presented by Rushby in 1992. We strengthen his results in several ways, in particular clarifying the impact of transitive vs. intransitive policies on unwinding. Inspired partially by Mantel’s observations on unwinding for event systems, we remove the restriction on the unwinding relation to be an equivalence and obta...
This paper presents a framework for preserving location privacy without affecting the quality of service. In this framework, the services migrate a piece of code to a trusted server that is assumed to have location information of all the interesting subjects. The code executes on the trusted server, reads location information and sends back results. We present Non-inference, an information-flow...
Information-flow control tracks how information propagates through the program during execution to make sure that the program handles the information securely. Secure information flow is comprised of two related aspects: information confidentiality and information integrity — intuitively pertaining to the reading and writing of the information. The prevailing basic semantic notion of secure inf...
Decentralized Information Flow Control (DIFC) systems enable programmers to express a desired DIFC policy, and to have the policy enforced via a reference monitor that restricts interactions between system objects, such as processes and files. Current research on DIFC systems focuses on the referencemonitor implementation, and assumes that the desired DIFC policy is correctly specified. The foc...
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DIFC to the network. We present DStar, a system that enforces the security requirements of mutually distrustful components through cryptography on the network and local OS protection mechanisms on each host. DStar does n...
The paper considers the addition of access control to a number of transactional memory implementations, and studies its impact on the information flow security of such systems. Even after the imposition of access control, the Unbounded Transactional Memory due to Ananian et al, and most instances of a general scheme for transactional conflict detection and arbitration due to Scott, are shown to...
This document describes use cases and documents call flows that require the History-Info header field to capture the Request-URIs as a Session Initiation Protocol (SIP) Request is retargeted. The use cases are described along with the corresponding call flow diagrams and messaging details.
WEN-CHANG PAI, CHI-MING CHUNG, CHING-TANG HSIEH CHUN-CHIA WANG AND YING-HONG WANG Department of Business Mathematics Soochow University Taipei, 100 Taiwan E-mail: [email protected] The Open University of Kaohsiung Kaohsiung, 812 Taiwan E-mail: [email protected] Department of Electrical Engineering Department of Information Engineering Tamkang University Taipei, 251 Taiwan E-mail: {hsie...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید