Results 251 to 260 of about 4,354,998 (290)
Some of the next articles are maybe not open access.
A hardware architecture for controlling information flow
Proceedings of the 5th annual symposium on Computer architecture - ISCA '78, 1978The foundations of capability schemes are critically examined. The context free utilization of capabilities once acquired is shown to be inconsistent with both least privilege norm and information flow requirements. An enhanced Capability Vector mechanism which pre-confines the set of capabilities with which a given capability can be combined is ...
Harry J. Saal, Israel Gat
openaire +1 more source
Information-Flow Control with Fading Labels
2017 15th Annual Conference on Privacy, Security and Trust (PST), 2017Information-flow control mechanisms generally invest the same amount of resources to protect information of varying importance. In this paper, we introduce the concept of fading labels. Fading labels are security labels that stop propagating their taint after a fixed amount of uses.
openaire +1 more source
Practical dynamic information flow control
2018Seit Jahren werden Computersysteme und -Anwendungen immer komplexer und verarbeiten eine Unmenge private und sensible Daten. Die Komplexität der Anwendungen trägt neben der Existenz von (un)gewollt eingefügten Software Fehlern zur Weitergabe dieser sensiblen Informationen bei.
openaire +3 more sources
2016
Information objects are used for managing information and data. In addition to the global variable and the method, the following objects are information flow objects:
openaire +1 more source
Information objects are used for managing information and data. In addition to the global variable and the method, the following objects are information flow objects:
openaire +1 more source
Information Flow Control with Decentralized Service Compositions
IEEE International Conference on Web Services (ICWS 2007), 2007Decentralized execution settings are primordial for most processes where process participants are required to establish P2P interactions. This is particularly true for processes that subject the composition of services advertising different information flow policies.
Yildiz, Ustun, Godart, Claude
openaire +2 more sources
Type systems for information flow control
ACM SIGLOG News, 2017Information flow control is central to computer security. The objective of information flow control is to prevent unauthorized flows of secret information to the public outputs of a computation. This task is often accomplished using type systems that rely on modal operators to label and track information and, hence, this style of enforcing information ...
Vineet Rajani +3 more
openaire +2 more sources
A Perspective on Information-Flow Control
2012Information-flow control tracks how information propagates through the program during execution to make sure that the program handles the information securely. Secure information flow is comprised of two related aspects: information confidentiality and information integrity — intuitively pertaining to the reading and writing of the ...
Hedin Daniel, Sabelfeld Andrei
openaire +1 more source
Information flow controls vs inference controls: An integrated approach
1994This paper proposes a formal method for modeling database security based on a logical interpretation of two problems: the (internal) information flow controls and the (external) information inference controls. Examples are developed that illustrate the inability of “classical” security models such as non-interference and non-deducibility to completely ...
Frédéric Cuppens, Gilles Trouessin
openaire +1 more source

