نتایج جستجو برای: information flow control

تعداد نتایج: 2748403  

1999
Thomas Kern Leslie P. Willcocks

Information Technology (IT) outsourcing continues to experience phenomenal growth, with an estimated market size of over $70 billion in 1998. Its adoption by some of the largest international corporations has seen outsourcing become considered a key component of the Information Management agenda. Critical to this agenda is the formulation of comprehensive contracts. For this, legal experts and/...

Journal: :Computers in Human Behavior 2015
Mario Matamoros de Luis Amadeo José Argüelles-Cruz Abril V. Uriarte Arcia Cornelio Yáñez-Márquez

The study of the influence of the Green Information Technology (GIT), using their potential to reduce the negative impact of the exhaust emission produced by light-duty vehicles, attending verification compliance to circulate in urban areas, is the main topic of the present contribution. Data collected through surveys answered by car owners in Mexico City, place the attention over the knowledge...

Journal: :CoRR 2014
Ankita Garg

Measuring software complexity plays an important role to meet the demands of complex software. The cyclomatic complexity is one of most used and renowned metric among the other three proposed and researched metrics that are namely: Line of code, Halstead’s measure and cyclomatic complexity. Although cyclomatic complexity is very popular but also serves some of the problems which has been identi...

2010
Dorje C. Brody Lane P. Hughston Andrea Macrina

This paper presents an overview of information-based asset pricing. In the information-based approach, an asset is defined by its cash-flow structure. The market is assumed to have access to “partial” information about future cash flows. Each cash flow is determined by a collection of independent market factors called X-factors. The market filtration is generated by a set of information process...

Journal: :Computers & Security 2004
E. Eugene Schultz

Few pieces of legislation have affected so much so quickly and profoundly as the SarbaneseOxley (often abbreviated ‘‘SoX’’) Act of 2003. Triggered by accounting scandals such as Enron’s several years ago, SoX has many provisions, some of the most important of which require management of publicly traded companies to establish and maintain ‘‘an adequate internal control structure and procedures f...

2003
Shiguang Ju Héctor J. Hernández Lan Zhang

This paper introduces a general multi-layer storage structure. Object instances from geographic surface objects are transferred and stored into the standard structure. We introduce some new access control rules to modify the BLP model, so that the owner can process unrestrictedly an object that is created by the owner. When a process needs to decide whether to execute an object method, it calcu...

2008
Ingo H. C. Wassink Han Rauwerda Paul E. van der Vet Timo M. Breit Anton Nijholt

We introduce a new type of workflow design system called e-BioFlow and illustrate it by means of a simple sequence alignment workflow. E-BioFlow, intended to model advanced scientific workflows, enables the user to model a workflow from three different but strongly coupled perspectives: the control flow perspective, the data flow perspective, and the resource perspective. All three perspectives...

2003
Shih-Chien Chou

This paper proposes a model to control information flows among objects. It improves flexibility of the control by independently assigning security levels to attributes, arguments, and return values. It uses associations and multiple labels to control information flows among objects that may be dynamically instantiated during program execution. According to our survey, no model offers the contro...

Journal: :J. Inf. Sci. Eng. 2006
Shih-Chien Chou

Preventing information leakage during program execution is essential for modern applications. This paper proposes a model to prevent information leakage for objectoriented systems, which is based on role-based access control (RBAC). It is named MRBAC/AR (modified RBAC for both intrAand inteR-application information flow control) because it is a modification of RBAC96. It offers the following fe...

2007
Samiha Ayed Nora Cuppens-Boulahia Frédéric Cuppens

Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to using an access control model but also, it is primordial to deal with information flows in a system. Thus, an important function of a security policy is to enforce access to different system elements and supervise infor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید