This paper was part of the 2nd International Workshop on Managing Insider Security Threats (MIST 2010); Morika, Iwate, Japan (14-15 June 2010).International audienceIn this paper we present a model for defining and enforcing a fine-grained information flow policy. We describe how the policy can be enforced on a typical computer and present experiments using the proposed model. A key feature of the model is that it allows the expression of rules which detail precisely which information elements are allowed to mix together. For example, the model allows the expression of a policy which forbids a doctor from mixing the personal medical details of the patients. The enforcement mechanisms tracks and records information flows within the system so...
AbstractIn this paper, we study secure information flow policies in the sense of Meadows [C. Meadows...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
This paper was part of the 2nd International Workshop on Managing Insider Security Threats (MIST 201...
This paper was part of the 2nd International Workshop on Managing Insider Security Threats (MIST 201...
This paper was part of the 2nd International Workshop on Managing Insider Security Threats (MIST 201...
In this paper we present a model for defining and enforcing a fine-grained information flow policy. ...
Recent years have seen a proliferation of research on information flow control. While the progress h...
Part 4: Resource, Components and Information FlowInternational audienceInformation flow techniques t...
Part 4: Resource, Components and Information FlowInternational audienceInformation flow techniques t...
Research in enterprise system security has largely focused on the development of theoretical models ...
Research in enterprise system security has largely focused on the development of theoretical models ...
Research in enterprise system security has largely focused on the development of theoretical models ...
Research in enterprise system security has largely focused on the development of theoretical models ...
Information flow techniques typically classify information according to suitable security levels and...
AbstractIn this paper, we study secure information flow policies in the sense of Meadows [C. Meadows...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
This paper was part of the 2nd International Workshop on Managing Insider Security Threats (MIST 201...
This paper was part of the 2nd International Workshop on Managing Insider Security Threats (MIST 201...
This paper was part of the 2nd International Workshop on Managing Insider Security Threats (MIST 201...
In this paper we present a model for defining and enforcing a fine-grained information flow policy. ...
Recent years have seen a proliferation of research on information flow control. While the progress h...
Part 4: Resource, Components and Information FlowInternational audienceInformation flow techniques t...
Part 4: Resource, Components and Information FlowInternational audienceInformation flow techniques t...
Research in enterprise system security has largely focused on the development of theoretical models ...
Research in enterprise system security has largely focused on the development of theoretical models ...
Research in enterprise system security has largely focused on the development of theoretical models ...
Research in enterprise system security has largely focused on the development of theoretical models ...
Information flow techniques typically classify information according to suitable security levels and...
AbstractIn this paper, we study secure information flow policies in the sense of Meadows [C. Meadows...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...