Filters








379,781 Hits in 2.7 sec

A Theory of Information-Flow Labels

Benoit Montagu, Benjamin C. Pierce, Randy Pollack
2013 2013 IEEE 26th Computer Security Foundations Symposium  
To study the design space of information-flow labels and their relative expressiveness, we introduce label algebras, an abstract interface for information-flow labels equipped with a notion of authority  ...  Each one of the numerous calculi, languages, and systems for information-flow control includes a tiny domain-specific language of "micro security policies" called labels.  ...  Acknowledgments We are grateful to Steve Zdancewic, David Mazières, Deian Stefan, and the members of the SAFE team for fruitful discussions. Robin  ... 
doi:10.1109/csf.2013.8 dblp:conf/csfw/MontaguPP13 fatcat:7u6747sjq5dzpdzq7gtwfiothq

Labeled Fuzzy Rough Sets Versus Fuzzy Flow Graphs

Leszek Rolka, Alicja Mieszkowicz-Rolka
2016 Proceedings of the 8th International Joint Conference on Computational Intelligence  
This paper presents the idea of labeled fuzzy rough sets which constitutes a novel approach to rough approximation of fuzzy information systems.  ...  The labeled fuzzy rough sets approach is compared with the fuzzy flow graph approach.  ...  Every element of a Labeled Fuzzy Rough Sets Versus Fuzzy Flow Graphs universe, corresponding to a row of the decision table, flows through the graph by taking a unique path.  ... 
doi:10.5220/0006083301150120 dblp:conf/ijcci/RolkaM16 fatcat:mnnmmcqvija5leizrg32pe636i

Agent-based modeling of knowledge flows: illustration from the domain of information systems design

M.E. Nissen, R.E. Levitt
2004 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the  
In this article we build upon a steady stream of research in computational organization theory to develop agent-based models of knowledge flows.  ...  Such models draw from emerging theory for multidimensional representation of the knowledge flow phenomenon, and they enable the dynamics of enterprise knowledge flows to be formalized and simulated through  ...  As another instance, the cyclical flow of knowledge through a life cycle (labeled "KMLC") reflects a more complex dynamic than its simple linear counterpart.  ... 
doi:10.1109/hicss.2004.1265599 dblp:conf/hicss/NissenL04 fatcat:hwqagq4v4jhw7kit27gimhpbh4

Complete set of representations for dissipative chaotic three-dimensional dynamical systems

Daniel J. Cross, R. Gilmore
2010 Physical Review E  
Three representation labels are required for embeddings into R 3 , and only one is required in R 4 . In R 5 there is a single "universal" representation.  ...  We determine the topological labels required to distinguish inequivalent representations of three-dimensional dissipative dynamical systems when the embeddings are into R k , k = 3, 4, 5, . . . .  ...  THE IDEA OF REPRESENTATION THEORY The theory of groups is closely associated with the theory of group representations [8] .  ... 
doi:10.1103/physreve.82.056211 pmid:21230567 fatcat:gstlujjbnbgxtifh7oo3fwqhau

Capturing the real influencing factors of traffic for accurate traffic identification

Geza Szabo, Janos Szule, Bruno Lins, Zoltan Turanyi, Gergely Pongracz, Djamel Sadok, Stenio Femandes
2012 2012 IEEE International Conference on Communications (ICC)  
In this paper we introduce a novel framework for traffic identification that employs machine learning techniques focusing on the estimation of multiple traffic influencing factors.  ...  We utilize the outcome of the multiple models via a recombination algorithm to achieve high overall true positive and true negative and low overall false positive and false negative classification ratio  ...  Those flows which have no label information for that specific factor are ignored.  ... 
doi:10.1109/icc.2012.6363978 dblp:conf/icc/SzaboSLTPSF12 fatcat:ynqtye5r65dfphunqcoesj5fdu

Informational institutions in the agrifood sector: meta-information and meta-governance of environmental sustainability

Lan Ge, Christopher A Brewster
2016 Current Opinion in Environmental Sustainability  
Flows of information are governed by informal and formal social arrangements that we can collectively call Informational Institutions.  ...  From the perspectives of information theory and new institutional economics, current informational institutions are increasing the information entropy of communications concerning environmental sustainability  ...  Acknowledgements This research was supported by the Informational Governance Research Program of Wageningen UR to contribute to solutions for the most pressing global environmental problems.  ... 
doi:10.1016/j.cosust.2015.10.002 fatcat:2ghhoq6m6zbormgoye5l3kr7km

A multi-flow information flow tracking approach for proving quantitative hardware security properties

Yu Tai, Wei Hu, Lu Zhang, Dejun Mu, Ryan Kastner
2021 Tsinghua Science and Technology  
a small amount of information flows to enable desirable interactions.  ...  , and boundaries on the amount of simultaneous information flows.  ...  Shannon [8] pioneered in the notion of information theory, which provides the mathematical foundation for measuring security.  ... 
doi:10.26599/tst.2019.9010042 fatcat:k6unmub46rcqhitpadnxg2reru

Dependent Information Flow Types

Luísa Lourenço, Luís Caires
2015 Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - POPL '15  
In this paper, we develop a novel notion of dependent information flow types.  ...  Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural  ...  We also thank Jorge A. Perez and João C. Seco for related discussions. This work is supported by CITI PEst-OE/EEI/UI0527/2014, FCT/MEC grant SFRH/BD/68801/2010, and FLEX-Agile grant by OutSystems SA.  ... 
doi:10.1145/2676726.2676994 dblp:conf/popl/LourencoC15 fatcat:mp4lyjxnr5htjjhogdqdoewt4i

Multi-level Protection (Mlp) Policy Implementation using Graph Database

Lingala Thirupathi, Venkata Nageswara
2021 International Journal of Advanced Computer Science and Applications  
A formal structure in which Bell-LaPadula protection concepts are applied to track the information flow within a single domain after checking that the MLP lattice model is correctly represented in the  ...  By defining and testing the Bell-LaPadula access control environment within it, this paper implements a Multi-Level Protection (MLP) lattice model architecture based on a graph database.  ...  There is also the BLP model [20] which restricts the flow of information from a lower security label to a higher security label to only flow upward to mitigate compromising information confidentiality  ... 
doi:10.14569/ijacsa.2021.0120350 fatcat:4fv7kvx6ora2zdqbo23hyabz5a

A Modern Person as a Subiectum Neglegens: On the Problem of Constructive and Destructive Ignoring

Svitlana P. Balinchenko
2016 World Journal of Social Science Research  
</p><p>Constructive ignoring as an informational self-defense mechanism implies a variety of search modes for filtering the flow of information.  ...  It gives an idea of a person managing in the daily flow of information by ignoring the least relevant items, regardless of possible omissions and mistakes connected with the relevant ones.  ...  Vitaliy Lyakh (Institute of Philosophy, National Academy of Science, Ukraine).  ... 
doi:10.22158/wjssr.v3n1p114 fatcat:mw7iqmy2craorcdojltmzg64z4

Dynamic Control Method for Tenants' Sensitive Information Flow Based on Virtual Boundary Recognition (August 2020)

Xin Lu, Lifeng Cao, Xuehui Du
2020 IEEE Access  
Information flow control of file operation by a process.  ...  In view of the defects of traditional information flow control, Myers [26] proposed a decentralized label model and an extended security-type programming language (Java information flow, JIF), which  ... 
doi:10.1109/access.2020.3021415 fatcat:rmbat4belncrroxnbqx5jjffii

Page 3360 of Mathematical Reviews Vol. , Issue 91F [page]

1991 Mathematical Reviews  
State spaces of concurrent systems. Acta Inform. 27 (1990), no. 4, 343-368. A basic theory of labeled partial 2-structures (Ip2s’s), as loop-free directed edge-labeled graphs, is presented.  ...  Each labelling function A in the flow diagram determines a path called the flow diagram operation on the function 4.  ... 

Toward a MAC policy framework [chapter]

Xiaolei Qian, Teresa F. Lunt
1996 IFIP Advances in Information and Communication Technology  
We propose a formal policy framework of MAC policies in multilevel relational databases. We identify the important components of such policies and their desirable properties.  ...  The framework provides a basis for systematically specifying such policies and characterizing their potential mismatches.  ...  Department of Defense Advanced Research Projects Agency and U.S. Air Force Rome Laboratory under contracts F30602-91-C-0092 and F30602-92-C-0140.  ... 
doi:10.1007/978-0-387-34932-9_11 fatcat:exkyeaxdyre5fmqpzihgromdku

Measuring Information Flow in Reactive Processes [chapter]

Chunyan Mu
2009 Lecture Notes in Computer Science  
Finally, we show that there is a connection between our leakage definition and mutual information in the framework of information theory.  ...  First, we present the probabilistic model of reactive labelled transition system with input-output actions.  ...  This work is funded by the EPSRC grant EP/C009967/1 Quantitative Information Flow and Royal Society Project Information Flow in Process Algebras.  ... 
doi:10.1007/978-3-642-11145-7_17 fatcat:dak24pddnnapho7vk4dgicoz6q

A Perspective on Graphs and Access Control Models [chapter]

Ravi Sandhu
2004 Lecture Notes in Computer Science  
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization.  ...  Much of this prior research is based on first principles, although more recently there have been significant efforts to build upon existing graph theory results and approaches.  ...  Information security is a broad field and offers multiple avenues for application of graph theory.  ... 
doi:10.1007/978-3-540-30203-2_2 fatcat:424fncklwfhhrl4dpvhv6zxaxq
« Previous Showing results 1 — 15 out of 379,781 results