342,864 Hits in 4.3 sec

Efficient user-space information flow control

Ben Niu, Gang Tan
2013 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13  
We describe the design and implementation of duPro, an efficient user-space information flow control framework. duPro adopts Software-based Fault Isolation (SFI [22]) to isolate protection domains within  ...  It controls the end-to-end information flow at the granularity of SFI domains. Being a user-space framework, duPro does not require any OS changes.  ...  A user-space DIFC framework is not without its challenges. One challenge we have encountered during experiments is to provide an efficient user-space domain-reuse mechanism.  ... 
doi:10.1145/2484313.2484328 dblp:conf/ccs/NiuT13 fatcat:dr4x5deohrgi3chyh3pxaukeby

A CEP Privacy Security Access Control Framework Based on Event Attribute Detecting Tree

Bo Hong, Xin Jing
2019 International Journal of Advanced Network, Monitoring, and Controls  
The experimental result shows that such framework is able to realize efficient privacy information filtration based on the user role to reach the goal of CEP detecting information processing in a safe  ...  In order to prevent illegal users from acquiring any information via registered event patterns, this paper discusses the CEP privacy security access control object in depth, formally defines four types  ...  meaning among the information from the high-speed data flow in real time.  ... 
doi:10.21307/ijanmc-2019-009 fatcat:7t7mwic4knhcdo3kwjabn7wr6q

A Space Information Service Forwarding Mechanism Based on Software Defined Network

Wei Zhou, Baokang Zhao
2019 Journal of Internet Services and Information Security  
Efficient carrying and the information integration amongst different information services are the major challenges in the space information networks, which are constantly affecting the performance of system  ...  Space information network includes multi-system integration that involves real-time acquisition, transmission, and processing over the information systems.  ...  Introduction Space information network supports various types of space platforms as a carrier through an efficient integration of multi-systems [5] .Space information network includes Geosynchronous Equatorial  ... 
doi:10.22667/jisis.2017.08.31.048 doaj:0333be2922ef418f9ace8597754e7aaa fatcat:5rqfpnnzizhmfojjhudcfjc4zi

A System Concept for 3D Human Flow Management Based on 3D Spatial Information

Jayoung Yoon, Byungju Ahn, Jaejun Kim, Gwanggook Lee, Whoiyul Kim
2008 Journal of Asian Architecture and Building Engineering  
The controller can thus obtain information on the occurrence of possible accidents proactively.  ...  The objective of this study is to suggest a system for 3D human flow management using a technologybased decision-making process.  ...  Need for a System to Manage User Flow Controllers in charge of user safety resort to monitoring systems such as CCTV to capture information about circumstances that require action, and base their action  ... 
doi:10.3130/jaabe.7.63 fatcat:zbvz6o7y7rb33c5tbn5eg52ipq

Optimizing in the Dark: Learning an Optimal Solution through a Simple Request Interface

Qiao Xiang, Haitao Yu, James Aspnes, Franck Le, Linghe Kong, Y. Richard Yang
without exchanging any private information between the network and the user.  ...  (e.g., to the user).  ...  ): • Step 1: The user submits a resource reservation request for a set of flows F to the ARO controller.  ... 
doi:10.1609/aaai.v33i01.33011674 fatcat:n72flbcq4nbvretanfjjefasoq

Information and Analytical Support of Financial Controlling of Joint Activities of Business Entities

Аlla Dmytrenko, Larysa Marchenko
2020 ЕКОНОМІКА І РЕГІОН Науковий вісник  
The peculiarities of the formation and circulation of controlling financial information are analyzed, its essence is determined, the peculiarities of the information space functioning of joint activity  ...  It is proposed to consider the information space of controlling information as a single medium of data circulation on various components of development of a separate business entity.  ...  in joint activities and information space and information flows between participants in joint activities.  ... 
doi:10.26906/eir.2020.3(78).2001 fatcat:kh4x3enndfbnxnchk2okmg5kdu

Software Cruising: A New Technology for Building Concurrent Software Monitor [chapter]

Dinghao Wu, Peng Liu, Qiang Zeng, Donghai Tian
2013 Secure Cloud Computing  
Applications include, but are not limited to, heap buffer integrity checking, kernel memory cruising, data structure and object invariant checking, rootkit detection, and information provenance and flow  ...  We have developed two prototypical cruising systems: Cruiser, a lock-free concurrent heap buffer overflow monitor in user space, and Kruiser, a semisynchronized non-blocking OS kernel cruiser.  ...  Information Flow Integrity Security models for information flow controls were studied many years ago [17] .  ... 
doi:10.1007/978-1-4614-9278-8_14 fatcat:3goyj5eijzfgndwjii2jvow4y4

CrowdFlow: Efficient Information Flow Security [chapter]

Christoph Kerschbaumer, Eric Hennigan, Per Larsen, Stefan Brunthaler, Michael Franz
2015 Lecture Notes in Computer Science  
Even though the CrowdFlow approach permits individuals to miss detection of specific information flow violations, we show that a crowd of users, in aggregate, detects the majority of information flow violations  ...  Participating users can then benefit from receiving warnings about blacklisted URLs, similar to anti-phishing filters. Our measurements indicate that our approach is both efficient and effective.  ...  User C finds an additional 903 (13.81%) information flows and User D finds a further 173 (1.33%) information flows.  ... 
doi:10.1007/978-3-319-27659-5_23 fatcat:gclcirpiynfhdh3jynowqf7qle

Map Use in Transit Control Centers: Mapping geographic information flows

Emily Domanico
2019 Abstracts of the International Cartographic Association  
With the additional information, dispatchers are being asked to work across geographic and schematic representations of space when planning train movements and assessing the speed and flow of trains through  ...  Dispatchers identify the importance of aligning information displays and engaging with the information before them as productive for planning efficient maneuvers or spotting unsafe alignments.  ...  With the additional information, dispatchers are being asked to work across geographic and schematic representations of space when planning train movements and assessing the speed and flow of trains through  ... 
doi:10.5194/ica-abs-1-65-2019 fatcat:ltl5h3zb45a6pgzy6ziwsfciyi

A Practical Approach toward Implementing Automated Intersection Management

Bas van der Bijl, CoenBresser, JeroenBrouwer
2019 Journal of Traffic and Transportation Engineering  
Unfortunately, automatic control is only possible in a fully autonomous environment without legacy vehicles and vulnerable road users like cyclists and pedestrians.  ...  A new message protocol, the individual Space & Time message (iSPaT), is introduced to effectively send instructions to autonomous vehicles.  ...  Hybrid Intersection Management Connected traffic light controllers receive information from individual vehicles, CAM and DEMN messages, and use the information for efficiently scheduling green phases.  ... 
doi:10.17265/2328-2142/2019.05.003 fatcat:m6dwcnajs5f4lf2bbop3vdoety

Transformation of Sequential Program to KPN - An Overview

Danish Ather, Vinodani Katiyar
2012 International Journal of Computer Applications  
Control Flow Traversal Control flow traversal takes the AST data as input and traverses the AST in the pattern similar to the flow of control of the program when it is executed.  ...  Generate user information To provide information to the user for task and channels generated from the tool we have provided a graphical output of tasks and channels in generate user information.  ... 
doi:10.5120/5076-7487 fatcat:bf6p6jovwbfrxofipzbvjjhuga

Improving Ergonomics in Teleoperation

2014 Journal of Ergonomics  
Fitts PM (1954) The information capacity of the human motor system in controlling the amplitude of movement. J Exp Psychol 47:381-391. 2.  ...  Such changes modify the information flow between human and machine according to the characteristics and limitations of both. References 1.  ...  Such changes modify the information flow between human and machine according to the characteristics and limitations of both.  ... 
doi:10.4172/2165-7556.1000e125 fatcat:kyloao5i65h6dljw4jpzojz3hm

On How to Design Smart Energy-Efficient Buildings

Donatella Sciuto, Alessandro Antonio Nacci
2014 2014 12th IEEE International Conference on Embedded and Ubiquitous Computing  
The paper presents an overview of the design flow implemented to support the design of scalable architectures for energy aware smart spaces.  ...  Since they can be used for an efficient management of the energy consumption of buildings, there is a growing interest for them, both in academia and industry.  ...  Figure 1 . 1 Smart space general architecture Figure 4 . 4 Smart space design flow  ... 
doi:10.1109/euc.2014.37 dblp:conf/euc/SciutoN14 fatcat:mfcapa7yk5emro6ferc4pyvp6m

Energy Efficiency Analysis of e-Commerce Customer Management System Based on Mobile Edge Computing

Wenxing Chen, Bin Yang, Le Sun
2022 Scientific Programming  
The decision space is a two-dimensional space composed of unloading decision and power control, and the benefit function is the energy efficiency function and delay function.  ...  and improve the energy efficiency of unloading calculation under the same task compared with the game scheme without considering power consumption control when the number of e-commerce customer management  ...  user information in descending order of energy efficiency f 9: calculate P and broadcast it to all users 10: wait for the user load migration task to be executed than ODPC.  ... 
doi:10.1155/2022/5333346 fatcat:oinfveg5i5hkfoktqtby5frvni

Access-control-based Efficient Privacy Protection Method for Social Networking Services

Yu-Jong Jang, Jin Kwak
2013 International Journal of Security and Its Applications  
In this paper, we propose a method for the efficient protection of privacy in SNS based on access control  ...  However, SNSs raise concerns about the security and privacy of users because the information written by the user might be exposed in the SNS.  ...  Information Creator User B, User E is not have access control. Access control is available only to the owner of the Information Space. Thus, User E can see user B's Information.  ... 
doi:10.14257/ijsia.2013.7.5.28 fatcat:iwe2oqiconfullrhv7v66i3loe
« Previous Showing results 1 — 15 out of 342,864 results