This thesis presents a study of problems in protection and security that arise in a general-purpose computing facility. We study these problems in the context of a dataflow system. The protection mechanisms are based on attaching keys to values exchanged among different subjects (users) of the system. Subjects are modelled as dataflow resource managers. A key attached to a value does not prevent that value from being propagated to any place within the system; rather, it guarantees that the value and any information derived from that value cannot leave the system (cannot be output) unless the same key is presented. The idea of attaching a key to a value is also used to allow the origin of that value to be verified. This facility is employed ...
Information flow security concerns how to protect sensitive data in computer systems by avoiding und...
The theme of this paper is to present the data transmission security system between the stations of ...
This thesis investigates the specification and the application of dynamic security policies in infor...
This thesis presents a study of problems in protection and security that arise in a general-purpose ...
A protection model is presented for a multi-user dataflow computing system which is incorporated int...
A protection model is presented for a general-purpose computing system based on keys attached as ‘se...
Sensitive information is a crucial asset for both individuals and companies. Since it is processed i...
As more and more sensitive data is handled by software, itstrustworthiness becomes an increasingly i...
Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality viol...
This composition designs data security in public accessible computers in organization, which uses fo...
The aim of my bachalor's thesis is secure transport NetFlow data. Communication in NetFlow is not pr...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
Abstract—The importance of computer security in order to maintain the confidentiality, integrity and...
Information flow control mechanisms detect and prevent transfers of information which violate the se...
Software applications which run in a compromised environment and perform sensitive operations, such ...
Information flow security concerns how to protect sensitive data in computer systems by avoiding und...
The theme of this paper is to present the data transmission security system between the stations of ...
This thesis investigates the specification and the application of dynamic security policies in infor...
This thesis presents a study of problems in protection and security that arise in a general-purpose ...
A protection model is presented for a multi-user dataflow computing system which is incorporated int...
A protection model is presented for a general-purpose computing system based on keys attached as ‘se...
Sensitive information is a crucial asset for both individuals and companies. Since it is processed i...
As more and more sensitive data is handled by software, itstrustworthiness becomes an increasingly i...
Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality viol...
This composition designs data security in public accessible computers in organization, which uses fo...
The aim of my bachalor's thesis is secure transport NetFlow data. Communication in NetFlow is not pr...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
Abstract—The importance of computer security in order to maintain the confidentiality, integrity and...
Information flow control mechanisms detect and prevent transfers of information which violate the se...
Software applications which run in a compromised environment and perform sensitive operations, such ...
Information flow security concerns how to protect sensitive data in computer systems by avoiding und...
The theme of this paper is to present the data transmission security system between the stations of ...
This thesis investigates the specification and the application of dynamic security policies in infor...