Sciweavers

2335 search results - page 19 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
MMMACNS
2001
Springer
15 years 6 months ago
The Set and Function Approach to Modeling Authorization in Distributed Systems
Abstract. We present a new model that provides clear and precise semantics for authorization. The semantics is independent from underling security mechanisms and is separate from i...
Tatyana Ryutov, B. Clifford Neuman
SAFECOMP
2001
Springer
15 years 6 months ago
About the Design of Distributed Control Systems: The Quasi-Synchronous Approach
Paul Caspi, Christine Mazuet, Natacha Reynaud Pali...
TIFS
2008
136views more  TIFS 2008»
15 years 1 months ago
Distributed Detection of Information Flows
Abstract--Distributed detection of information flows is considered in which traffic sensors at different locations of a network observe transmission epochs. The traffic sensors com...
Ting He, Lang Tong
SACMAT
2011
ACM
14 years 4 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
WISA
2007
Springer
15 years 7 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang