A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Theory of Information-Flow Labels
2013
2013 IEEE 26th Computer Security Foundations Symposium
To study the design space of information-flow labels and their relative expressiveness, we introduce label algebras, an abstract interface for information-flow labels equipped with a notion of authority ...
Each one of the numerous calculi, languages, and systems for information-flow control includes a tiny domain-specific language of "micro security policies" called labels. ...
Acknowledgments We are grateful to Steve Zdancewic, David Mazières, Deian Stefan, and the members of the SAFE team for fruitful discussions. Robin ...
doi:10.1109/csf.2013.8
dblp:conf/csfw/MontaguPP13
fatcat:7u6747sjq5dzpdzq7gtwfiothq
Labeled Fuzzy Rough Sets Versus Fuzzy Flow Graphs
2016
Proceedings of the 8th International Joint Conference on Computational Intelligence
This paper presents the idea of labeled fuzzy rough sets which constitutes a novel approach to rough approximation of fuzzy information systems. ...
The labeled fuzzy rough sets approach is compared with the fuzzy flow graph approach. ...
Every element of a Labeled Fuzzy Rough Sets Versus Fuzzy Flow Graphs universe, corresponding to a row of the decision table, flows through the graph by taking a unique path. ...
doi:10.5220/0006083301150120
dblp:conf/ijcci/RolkaM16
fatcat:mnnmmcqvija5leizrg32pe636i
Agent-based modeling of knowledge flows: illustration from the domain of information systems design
2004
37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the
In this article we build upon a steady stream of research in computational organization theory to develop agent-based models of knowledge flows. ...
Such models draw from emerging theory for multidimensional representation of the knowledge flow phenomenon, and they enable the dynamics of enterprise knowledge flows to be formalized and simulated through ...
As another instance, the cyclical flow of knowledge through a life cycle (labeled "KMLC") reflects a more complex dynamic than its simple linear counterpart. ...
doi:10.1109/hicss.2004.1265599
dblp:conf/hicss/NissenL04
fatcat:hwqagq4v4jhw7kit27gimhpbh4
Complete set of representations for dissipative chaotic three-dimensional dynamical systems
2010
Physical Review E
Three representation labels are required for embeddings into R 3 , and only one is required in R 4 . In R 5 there is a single "universal" representation. ...
We determine the topological labels required to distinguish inequivalent representations of three-dimensional dissipative dynamical systems when the embeddings are into R k , k = 3, 4, 5, . . . . ...
THE IDEA OF REPRESENTATION THEORY The theory of groups is closely associated with the theory of group representations [8] . ...
doi:10.1103/physreve.82.056211
pmid:21230567
fatcat:gstlujjbnbgxtifh7oo3fwqhau
Capturing the real influencing factors of traffic for accurate traffic identification
2012
2012 IEEE International Conference on Communications (ICC)
In this paper we introduce a novel framework for traffic identification that employs machine learning techniques focusing on the estimation of multiple traffic influencing factors. ...
We utilize the outcome of the multiple models via a recombination algorithm to achieve high overall true positive and true negative and low overall false positive and false negative classification ratio ...
Those flows which have no label information for that specific factor are ignored. ...
doi:10.1109/icc.2012.6363978
dblp:conf/icc/SzaboSLTPSF12
fatcat:ynqtye5r65dfphunqcoesj5fdu
Informational institutions in the agrifood sector: meta-information and meta-governance of environmental sustainability
2016
Current Opinion in Environmental Sustainability
Flows of information are governed by informal and formal social arrangements that we can collectively call Informational Institutions. ...
From the perspectives of information theory and new institutional economics, current informational institutions are increasing the information entropy of communications concerning environmental sustainability ...
Acknowledgements This research was supported by the Informational Governance Research Program of Wageningen UR to contribute to solutions for the most pressing global environmental problems. ...
doi:10.1016/j.cosust.2015.10.002
fatcat:2ghhoq6m6zbormgoye5l3kr7km
A multi-flow information flow tracking approach for proving quantitative hardware security properties
2021
Tsinghua Science and Technology
a small amount of information flows to enable desirable interactions. ...
, and boundaries on the amount of simultaneous information flows. ...
Shannon [8] pioneered in the notion of information theory, which provides the mathematical foundation for measuring security. ...
doi:10.26599/tst.2019.9010042
fatcat:k6unmub46rcqhitpadnxg2reru
Dependent Information Flow Types
2015
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - POPL '15
In this paper, we develop a novel notion of dependent information flow types. ...
Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural ...
We also thank Jorge A. Perez and João C. Seco for related discussions. This work is supported by CITI PEst-OE/EEI/UI0527/2014, FCT/MEC grant SFRH/BD/68801/2010, and FLEX-Agile grant by OutSystems SA. ...
doi:10.1145/2676726.2676994
dblp:conf/popl/LourencoC15
fatcat:mp4lyjxnr5htjjhogdqdoewt4i
Multi-level Protection (Mlp) Policy Implementation using Graph Database
2021
International Journal of Advanced Computer Science and Applications
A formal structure in which Bell-LaPadula protection concepts are applied to track the information flow within a single domain after checking that the MLP lattice model is correctly represented in the ...
By defining and testing the Bell-LaPadula access control environment within it, this paper implements a Multi-Level Protection (MLP) lattice model architecture based on a graph database. ...
There is also the BLP model [20] which restricts the flow of information from a lower security label to a higher security label to only flow upward to mitigate compromising information confidentiality ...
doi:10.14569/ijacsa.2021.0120350
fatcat:4fv7kvx6ora2zdqbo23hyabz5a
A Modern Person as a Subiectum Neglegens: On the Problem of Constructive and Destructive Ignoring
2016
World Journal of Social Science Research
</p><p>Constructive ignoring as an informational self-defense mechanism implies a variety of search modes for filtering the flow of information. ...
It gives an idea of a person managing in the daily flow of information by ignoring the least relevant items, regardless of possible omissions and mistakes connected with the relevant ones. ...
Vitaliy Lyakh (Institute of Philosophy, National Academy of Science, Ukraine). ...
doi:10.22158/wjssr.v3n1p114
fatcat:mw7iqmy2craorcdojltmzg64z4
Dynamic Control Method for Tenants' Sensitive Information Flow Based on Virtual Boundary Recognition (August 2020)
2020
IEEE Access
Information flow control of file operation by a process. ...
In view of the defects of traditional information flow control, Myers [26] proposed a decentralized label model and an extended security-type programming language (Java information flow, JIF), which ...
doi:10.1109/access.2020.3021415
fatcat:rmbat4belncrroxnbqx5jjffii
Page 3360 of Mathematical Reviews Vol. , Issue 91F
[page]
1991
Mathematical Reviews
State spaces of concurrent systems. Acta Inform. 27 (1990), no. 4, 343-368. A basic theory of labeled partial 2-structures (Ip2s’s), as loop-free directed edge-labeled graphs, is presented. ...
Each labelling function A in the flow diagram determines a path called the flow diagram operation on the function 4. ...
Toward a MAC policy framework
[chapter]
1996
IFIP Advances in Information and Communication Technology
We propose a formal policy framework of MAC policies in multilevel relational databases. We identify the important components of such policies and their desirable properties. ...
The framework provides a basis for systematically specifying such policies and characterizing their potential mismatches. ...
Department of Defense Advanced Research Projects Agency and U.S. Air Force Rome Laboratory under contracts F30602-91-C-0092 and F30602-92-C-0140. ...
doi:10.1007/978-0-387-34932-9_11
fatcat:exkyeaxdyre5fmqpzihgromdku
Measuring Information Flow in Reactive Processes
[chapter]
2009
Lecture Notes in Computer Science
Finally, we show that there is a connection between our leakage definition and mutual information in the framework of information theory. ...
First, we present the probabilistic model of reactive labelled transition system with input-output actions. ...
This work is funded by the EPSRC grant EP/C009967/1 Quantitative Information Flow and Royal Society Project Information Flow in Process Algebras. ...
doi:10.1007/978-3-642-11145-7_17
fatcat:dak24pddnnapho7vk4dgicoz6q
A Perspective on Graphs and Access Control Models
[chapter]
2004
Lecture Notes in Computer Science
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. ...
Much of this prior research is based on first principles, although more recently there have been significant efforts to build upon existing graph theory results and approaches. ...
Information security is a broad field and offers multiple avenues for application of graph theory. ...
doi:10.1007/978-3-540-30203-2_2
fatcat:424fncklwfhhrl4dpvhv6zxaxq
« Previous
Showing results 1 — 15 out of 379,781 results