نتایج جستجو برای: information flow control

تعداد نتایج: 2748403  

Journal: :Inf. Comput. 2014
Sara Capecchi Ilaria Castellani Mariangiola Dezani-Ciancaglini

We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, it prevents information leaks due to the specific cont...

2002
Chiara Braghin Agostino Cortesi Riccardo Focardi Steffen van Bakel

The notion of “boundary ambient” has been recently introduced to model multilevel security policies in the scenario of mobile systems, within pure Mobile Ambients calculus. Information flow is defined in terms of the possibility for a confidential ambient/data to move outside a security boundary, and boundary crossings can be captured through a suitable Control Flow Analysis. We show that this ...

Journal: :Int. J. Semantic Computing 2015
Andreas Kasten Ansgar Scherp

Information flow control on the Internet is a desirable feature when it comes to content such as neoNazi propaganda, child pornography, or material showing extreme violence or crimes. In order to provide for a flexible control of information flow on the Internet, we present the pattern system InFO (short for: Information Flow Ontology). InFO provides a common support for different enforcing sys...

2000
Reid Bailey Bert Bras Janet K. Allen

Reid Bailey Department of Mechanical & Aerospace Engineering University of Dayton Dayton, OH 45469-0210 Bert Bras and Janet K. Allen Systems Realization Laboratory G. W. Woodruff School of Mechanical Engineering Georgia Institute of Technology Atlanta, Georgia 30332-0405, USA * corresponding author Abstract Continuing with the themes of the first part of this paper, this second part is focused ...

Journal: :IEEE Access 2021

When users upload their private data to the cloud, they lose control of stored in cloud server. If system cannot provide an effective security mechanism protect data, consequent leakage issue will hinder development computing. Conventional access and encryption technologies effectively propagation tenant system. The mandatory one-way information flow model is limited by complexity environment, ...

2006
Karthik Palaniappan Antony Jameson

Every airplane has an associated external flow field that is extraordinarily rich in terms of its flow physics. It is intuitively obvious that the shape and configuration of the airplane influences the external flow physics, and the nature of the flow field influences the aerodynamic performance. An airplane is designed to perform optimally under certain operating conditions. Its aerodynamic pe...

2012
Ultan Sharkey Thomas Acton Kieran Conboy

This research investigates the influences of product presentation modes, decision behaviour and the consumer experience on Internet shopping. The growth of online shopping brings with it cognitive challenges for consumers attempting to assess large numbers of options in purchase decisions. Further, there is little guidance for vendors in terms of presenting large numbers of product. In this stu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید