咨询与建议

限定检索结果

文献类型

  • 5 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 8 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 1 篇 电气工程
    • 1 篇 网络空间安全

主题

  • 9 篇 decentralized in...
  • 2 篇 adaptive securit...
  • 2 篇 decentralized fe...
  • 2 篇 adaptive trust
  • 2 篇 labels
  • 2 篇 security
  • 1 篇 difc
  • 1 篇 policy language
  • 1 篇 endpoints
  • 1 篇 file access virt...
  • 1 篇 lio
  • 1 篇 debugging
  • 1 篇 model checking
  • 1 篇 serverless compu...
  • 1 篇 security analyti...
  • 1 篇 hails
  • 1 篇 logic
  • 1 篇 privilege protec...
  • 1 篇 reference monito...
  • 1 篇 dclabels

机构

  • 2 篇 stanford univ st...
  • 1 篇 sun yat sen univ...
  • 1 篇 linnaeus univ co...
  • 1 篇 mit cambridge ma
  • 1 篇 linnaeus univ va...
  • 1 篇 n carolina state...
  • 1 篇 key laboratory o...
  • 1 篇 chalmers gothenb...
  • 1 篇 univ illinois ch...
  • 1 篇 school of comput...
  • 1 篇 chalmers univ te...
  • 1 篇 ucla ca
  • 1 篇 univ calif los a...

作者

  • 2 篇 stefan deian
  • 2 篇 khakpour narges
  • 2 篇 russo alejandro
  • 2 篇 skandylas charil...
  • 2 篇 andersson jesper
  • 2 篇 mazieres david
  • 1 篇 maxwell krohn
  • 1 篇 tang jingya
  • 1 篇 xiao ruizhi
  • 1 篇 efstathopoulos p...
  • 1 篇 wang juan
  • 1 篇 polinsky isaac
  • 1 篇 mitchell john c.
  • 1 篇 micah brodsky
  • 1 篇 enck william
  • 1 篇 m. frans kaashoe...
  • 1 篇 kohler eddie
  • 1 篇 bates adam
  • 1 篇 xiong shengchao
  • 1 篇 yan fei

语言

  • 8 篇 英文
  • 1 篇 其他
检索条件"主题词=Decentralized Information Flow Control"
9 条 记 录,以下是1-10 订阅
排序:
DIFCS: A Secure Cloud Data Sharing Approach Based on decentralized information flow control
收藏 引用
COMPUTERS & SECURITY 2022年 117卷 102678-102678页
作者: Lu, Jintian Sun, Jiakun Xiao, Ruizhi Jin, Shuyuan Sun Yat Sen Univ Sch Comp Sci & Engn Guangzhou Peoples R China
A Summary In the field of cloud computing, collaboration and data sharing among clouds have dramatically increased. How to protect the security of shared cloud data is being an urgent problem. Based on decentralized i... 详细信息
来源: 评论
AT-DIFC+: Toward Adaptive and Trust-Aware decentralized information flow control
收藏 引用
ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS 2021年 第4期15卷 13-13页
作者: Skandylas, Charilaos Khakpour, Narges Andersson, Jesper Linnaeus Univ Vaxjo Sweden
Modern software systems and their corresponding architectures are increasingly decentralized, distributed, and dynamic. As a consequence, decentralized mechanisms are required to ensure security in such architectures.... 详细信息
来源: 评论
Adaptive Trust-Aware decentralized information flow control  1
Adaptive Trust-Aware Decentralized Information Flow Control
收藏 引用
1st IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS)
作者: Skandylas, Charilaos Khakpour, Narges Andersson, Jesper Linnaeus Univ Comp Sci & Media Technol Vaxjo Sweden
Modern software systems are decentralized, distributed, and dynamic, and consequently, require decentralized mechanisms to enforce security. In this paper, we propose an adaptive approach using a combination of decent... 详细信息
来源: 评论
Effect:An Operational View Mechanism for decentralized information flow control
收藏 引用
Wuhan University Journal of Natural Sciences 2012年 第5期17卷 435-440页
作者: YAN Fei TANG Jingya XIONG Shengchao WANG Juan Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan 430072 Hubei China School of Computer Wuhan University Wuhan 430072 Hubei China
Flume, which implements decentralized information flow control (DIFC), allows a high security level process to "pre-create" secret files in a low security level directory. However, the pre-create mechanism makes s... 详细信息
来源: 评论
SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing  21
SCIFFS: Enabling Secure Third-Party Security Analytics using...
收藏 引用
26th ACM Symposium on Access control Models and Technologies (SACMAT)
作者: Polinsky, Isaac Datta, Pubali Bates, Adam Enck, William N Carolina State Univ Raleigh NC 27695 USA Univ Illinois Champaign IL USA
Third-party security analytics allow companies to outsource threat monitoring tasks to teams of experts and avoid the costs of in-house security operations centers. By analyzing telemetry data from many clients these ... 详细信息
来源: 评论
Building Secure Systems with LIO (Demo)
收藏 引用
ACM SIGPLAN NOTICES 2014年 第12期49卷 93-94页
作者: Stefan, Deian Levy, Amit Russo, Alejandro Mazieres, David Stanford Univ Stanford CA 94305 USA Chalmers Gothenburg Sweden
LIO is a decentralized information flow control (DIFC) system, implemented in Haskell. In this demo, we give an overview of the LIO library and show how LIO can be used to build secure systems. In particular, we show ... 详细信息
来源: 评论
Disjunction Category Labels
收藏 引用
16th Nordic Conference on Secure IT-Systems (NordSec)
作者: Stefan, Deian Russo, Alejandro Mazieres, David Mitchell, John C. Stanford Univ Stanford CA 94305 USA Chalmers Univ Technol Gothenburg Sweden
We present disjunction category (DC) labels, a new label format for enforcing information flow in the presence of mutually distrusting parties. DC labels can be ordered to form a lattice, based on propositional logic ... 详细信息
来源: 评论
Manageable Fine-Grained information flow  08
Manageable Fine-Grained Information Flow
收藏 引用
3rd ACM European Conference on Computer Systems (EuroSys 08)
作者: Efstathopoulos, Petros Kohler, Eddie Univ Calif Los Angeles Dept Comp Sci Los Angeles CA 90024 USA
The continuing frequency and seriousness of security incidents underlines the importance of application security. decentralized information flow control (DIFC), a promising tool for improving application security, giv... 详细信息
来源: 评论
information flow control for standard OS abstractions  07
Information flow control for standard OS abstractions
收藏 引用
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
作者: Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler Robert Morris MIT Cambridge MA UCLA Los Angeles CA
decentralized information flow control (DIFC) is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world. As applied to privacy, DIF... 详细信息
来源: 评论