A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2014; you can also visit the original URL.
The file type is application/pdf
.
Filters
Efficient user-space information flow control
2013
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13
We describe the design and implementation of duPro, an efficient user-space information flow control framework. duPro adopts Software-based Fault Isolation (SFI [22]) to isolate protection domains within ...
It controls the end-to-end information flow at the granularity of SFI domains. Being a user-space framework, duPro does not require any OS changes. ...
A user-space DIFC framework is not without its challenges. One challenge we have encountered during experiments is to provide an efficient user-space domain-reuse mechanism. ...
doi:10.1145/2484313.2484328
dblp:conf/ccs/NiuT13
fatcat:dr4x5deohrgi3chyh3pxaukeby
A CEP Privacy Security Access Control Framework Based on Event Attribute Detecting Tree
2019
International Journal of Advanced Network, Monitoring, and Controls
The experimental result shows that such framework is able to realize efficient privacy information filtration based on the user role to reach the goal of CEP detecting information processing in a safe ...
In order to prevent illegal users from acquiring any information via registered event patterns, this paper discusses the CEP privacy security access control object in depth, formally defines four types ...
meaning among the information from the high-speed data flow in real time. ...
doi:10.21307/ijanmc-2019-009
fatcat:7t7mwic4knhcdo3kwjabn7wr6q
A Space Information Service Forwarding Mechanism Based on Software Defined Network
2019
Journal of Internet Services and Information Security
Efficient carrying and the information integration amongst different information services are the major challenges in the space information networks, which are constantly affecting the performance of system ...
Space information network includes multi-system integration that involves real-time acquisition, transmission, and processing over the information systems. ...
Introduction Space information network supports various types of space platforms as a carrier through an efficient integration of multi-systems [5] .Space information network includes Geosynchronous Equatorial ...
doi:10.22667/jisis.2017.08.31.048
doaj:0333be2922ef418f9ace8597754e7aaa
fatcat:5rqfpnnzizhmfojjhudcfjc4zi
A System Concept for 3D Human Flow Management Based on 3D Spatial Information
2008
Journal of Asian Architecture and Building Engineering
The controller can thus obtain information on the occurrence of possible accidents proactively. ...
The objective of this study is to suggest a system for 3D human flow management using a technologybased decision-making process. ...
Need for a System to Manage User Flow Controllers in charge of user safety resort to monitoring systems such as CCTV to capture information about circumstances that require action, and base their action ...
doi:10.3130/jaabe.7.63
fatcat:zbvz6o7y7rb33c5tbn5eg52ipq
Optimizing in the Dark: Learning an Optimal Solution through a Simple Request Interface
2019
PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE
without exchanging any private information between the network and the user. ...
(e.g., to the user). ...
): • Step 1: The user submits a resource reservation request for a set of flows F to the ARO controller. ...
doi:10.1609/aaai.v33i01.33011674
fatcat:n72flbcq4nbvretanfjjefasoq
Information and Analytical Support of Financial Controlling of Joint Activities of Business Entities
2020
ЕКОНОМІКА І РЕГІОН Науковий вісник
The peculiarities of the formation and circulation of controlling financial information are analyzed, its essence is determined, the peculiarities of the information space functioning of joint activity ...
It is proposed to consider the information space of controlling information as a single medium of data circulation on various components of development of a separate business entity. ...
in joint activities and information space and information flows between participants in joint activities. ...
doi:10.26906/eir.2020.3(78).2001
fatcat:kh4x3enndfbnxnchk2okmg5kdu
Software Cruising: A New Technology for Building Concurrent Software Monitor
[chapter]
2013
Secure Cloud Computing
Applications include, but are not limited to, heap buffer integrity checking, kernel memory cruising, data structure and object invariant checking, rootkit detection, and information provenance and flow ...
We have developed two prototypical cruising systems: Cruiser, a lock-free concurrent heap buffer overflow monitor in user space, and Kruiser, a semisynchronized non-blocking OS kernel cruiser. ...
Information Flow Integrity Security models for information flow controls were studied many years ago [17] . ...
doi:10.1007/978-1-4614-9278-8_14
fatcat:3goyj5eijzfgndwjii2jvow4y4
CrowdFlow: Efficient Information Flow Security
[chapter]
2015
Lecture Notes in Computer Science
Even though the CrowdFlow approach permits individuals to miss detection of specific information flow violations, we show that a crowd of users, in aggregate, detects the majority of information flow violations ...
Participating users can then benefit from receiving warnings about blacklisted URLs, similar to anti-phishing filters. Our measurements indicate that our approach is both efficient and effective. ...
User C finds an additional 903 (13.81%) information flows and User D finds a further 173 (1.33%) information flows. ...
doi:10.1007/978-3-319-27659-5_23
fatcat:gclcirpiynfhdh3jynowqf7qle
Map Use in Transit Control Centers: Mapping geographic information flows
2019
Abstracts of the International Cartographic Association
With the additional information, dispatchers are being asked to work across geographic and schematic representations of space when planning train movements and assessing the speed and flow of trains through ...
Dispatchers identify the importance of aligning information displays and engaging with the information before them as productive for planning efficient maneuvers or spotting unsafe alignments. ...
With the additional information, dispatchers are being asked to work across geographic and schematic representations of space when planning train movements and assessing the speed and flow of trains through ...
doi:10.5194/ica-abs-1-65-2019
fatcat:ltl5h3zb45a6pgzy6ziwsfciyi
A Practical Approach toward Implementing Automated Intersection Management
2019
Journal of Traffic and Transportation Engineering
Unfortunately, automatic control is only possible in a fully autonomous environment without legacy vehicles and vulnerable road users like cyclists and pedestrians. ...
A new message protocol, the individual Space & Time message (iSPaT), is introduced to effectively send instructions to autonomous vehicles. ...
Hybrid Intersection Management Connected traffic light controllers receive information from individual vehicles, CAM and DEMN messages, and use the information for efficiently scheduling green phases. ...
doi:10.17265/2328-2142/2019.05.003
fatcat:m6dwcnajs5f4lf2bbop3vdoety
Transformation of Sequential Program to KPN - An Overview
2012
International Journal of Computer Applications
Control Flow Traversal Control flow traversal takes the AST data as input and traverses the AST in the pattern similar to the flow of control of the program when it is executed. ...
Generate user information To provide information to the user for task and channels generated from the tool we have provided a graphical output of tasks and channels in generate user information. ...
doi:10.5120/5076-7487
fatcat:bf6p6jovwbfrxofipzbvjjhuga
Improving Ergonomics in Teleoperation
2014
Journal of Ergonomics
Fitts PM (1954) The information capacity of the human motor system in controlling the amplitude of movement. J Exp Psychol 47:381-391. 2. ...
Such changes modify the information flow between human and machine according to the characteristics and limitations of both. References 1. ...
Such changes modify the information flow between human and machine according to the characteristics and limitations of both. ...
doi:10.4172/2165-7556.1000e125
fatcat:kyloao5i65h6dljw4jpzojz3hm
On How to Design Smart Energy-Efficient Buildings
2014
2014 12th IEEE International Conference on Embedded and Ubiquitous Computing
The paper presents an overview of the design flow implemented to support the design of scalable architectures for energy aware smart spaces. ...
Since they can be used for an efficient management of the energy consumption of buildings, there is a growing interest for them, both in academia and industry. ...
Figure 1 . 1 Smart space general architecture
Figure 4 . 4 Smart space design flow ...
doi:10.1109/euc.2014.37
dblp:conf/euc/SciutoN14
fatcat:mfcapa7yk5emro6ferc4pyvp6m
Energy Efficiency Analysis of e-Commerce Customer Management System Based on Mobile Edge Computing
2022
Scientific Programming
The decision space is a two-dimensional space composed of unloading decision and power control, and the benefit function is the energy efficiency function and delay function. ...
and improve the energy efficiency of unloading calculation under the same task compared with the game scheme without considering power consumption control when the number of e-commerce customer management ...
user information in descending order of energy efficiency f 9: calculate P and broadcast it to all users 10: wait for the user load migration task to be executed than ODPC. ...
doi:10.1155/2022/5333346
fatcat:oinfveg5i5hkfoktqtby5frvni
Access-control-based Efficient Privacy Protection Method for Social Networking Services
2013
International Journal of Security and Its Applications
In this paper, we propose a method for the efficient protection of privacy in SNS based on access control ...
However, SNSs raise concerns about the security and privacy of users because the information written by the user might be exposed in the SNS. ...
Information Creator User B, User E is not have access control. Access control is available only to the owner of the Information Space. Thus, User E can see user B's Information. ...
doi:10.14257/ijsia.2013.7.5.28
fatcat:iwe2oqiconfullrhv7v66i3loe
« Previous
Showing results 1 — 15 out of 342,864 results