Filters








12,190 Hits in 4.2 sec

Information Leakage Detection in Boundary Ambients1 1Partially supported by MIUR Projects "Interpretazione Astratta, Type Systems e Analisi Control-Flow" and "Modelli formali per la sicurezza", and the EU Contract IST-2001-32617 "Models and Types for Security in Mobile Distributed Systems"

Chiara Braghin, Agostino Cortesi, Riccardo Focardi
2003 Electronical Notes in Theoretical Computer Science  
In this setting, we define a notion of non-interference which captures the absence of any (both direct and indirect) information leakage.  ...  A variant of Mobile Ambient Calculus is introduced, called Boundary Ambient, to model multilevel security policies.  ...  To the best of our knowledge, there is no result in literature concerning indirect information leakage detection in Mobile Ambients.  ... 
doi:10.1016/s1571-0661(04)81010-7 fatcat:4ix4b43xmjgm7kwhu47dhupxi4

Information flow security in Boundary Ambients

Chiara Braghin, Agostino Cortesi, Riccardo Focardi
2008 Information and Computation  
, i.e., to statically detect that no (direct or indirect) information leakage is ever possible at run-time.  ...  In this setting, absence of direct information leakage is granted as soon as the initial process satisfies some syntactic conditions.  ...  how information about suspect ambients/boudaries helps in detecting indirect information leakage, consider again process P 6 of Example 3.6.  ... 
doi:10.1016/j.ic.2007.12.001 fatcat:2qtjsb32vva2dh64lleuszp564

Flow-sensitive Leakage Analysis in Mobile Ambients

Chiara Braghin, Agostino Cortesi
2005 Electronical Notes in Theoretical Computer Science  
In this paper, we present a refinement of a Control Flow Analysis aimed at studying information flow security in the the calculus of Mobile Ambients.  ...  by making the analysis be flow-sensitive: the analysis is able to keep track of temporal dependencies of capabilities application when computing a safe approximation of the run-time topology of Mobile Ambient  ...  unwanted boundary crossing, i.e., information leakage.  ... 
doi:10.1016/j.entcs.2004.11.039 fatcat:u6thfqfzkbhnvf36uja2oj5aye

Boundary Inference for Enforcing Security Policies in Mobile Ambients [chapter]

Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Steffen Bakel
2002 Foundations of Information Technology in the Era of Network and Mobile Computing  
Information flow is defined in terms of the possibility for a confidential ambient/data to move outside a security boundary, and boundary crossings can be captured through a suitable Control Flow Analysis  ...  We show that this approach can be further enhanced to infer which ambients should be "protected" to guarantee the lack of information leakage for a given process.  ...  In order to detect information leakages, a typical approach (see, e.g., [2, 8, 9, 10, 12, 13] ) consists in directly defining what is an information flow from one level to another one.  ... 
doi:10.1007/978-0-387-35608-2_32 dblp:conf/ifipTCS/BraghinCFB02 fatcat:jpgcdc2dezf3xbohfb6j4taeme

Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients

C. Braghin, A. Cortesi, R. Focardi, F.L. Luccio, C. Piazza
2004 Electronical Notes in Theoretical Computer Science  
We study security issues, in particular information leakage detection, in the context of the Mobile Ambient calculus.  ...  We describe BANANA, a Java-based tool for ambient nesting analysis, by focussing on analysis accuracy and algorithmic optimizations.  ...  unwanted boundary crossing, i.e., information leakage.  ... 
doi:10.1016/j.entcs.2004.02.014 fatcat:ibkywz2jvjb6rluclaktlcdp3i

Information Flow Security in Mobile Ambients1 1Partially supported by MURST Projects "Interpretazione Astratta, Type Systems e Analisi Control-Flow", and "Certificazione automatica di programmi mediante interpretazione astratta"

Agostino Cortesi, Riccardo Focardi
2001 Electronical Notes in Theoretical Computer Science  
The information flow property of interest is defined in terms of the possibility for a confidential ambient/data to move outside a security boundary.  ...  A multilevel security policy is considered in the scenario of mobile systems, and modeled within "pure" Mobile Ambients calculus, in which no communication channels are present and the only possible actions  ...  In order to detect both direct and indirect information leakages, a typical approach (see, e.g., [2, [5] [6] [7] 9, 10] ) consists in directly defining what is an information flow from one level to another  ... 
doi:10.1016/s1571-0661(04)00235-x fatcat:jlf2v73sybd2rmcstrz4f2g62e

Control Flow Analysis of Mobile Ambients with Security Boundaries [chapter]

Chiara Braghin, Agostino Cortesi, Riccardo Focardi
2002 Formal Methods for Open Object-Based Distributed Systems V  
The information flow property of interest is defined in terms of the possibility for a confidential ambient/data to move outside a security boundary.  ...  In a previous paper, we gave a very simple syntactic property that is sufficient to imply the absence of unwanted information flows.  ...  Figure In order to detect both direct and indirect information leakages, a typical approach (see, e.g., (Bodei et al., 1999; Focardi and Gorrieri, 1995; Focardi and Gorrieri, 1997; Focardi et al., 2000  ... 
doi:10.1007/978-0-387-35496-5_14 fatcat:qu4afi72l5dtvmwcor6nf4zcnm

Leakage Evaluation by Virtual Entropy Generation (VEG) Method

Zhichao Zhang, Corina Drapaca, Zhifeng Zhang, Shuaifang Zhang, Shimei Sun, Hui Liu
2017 Entropy  
Finally, the new criterion was used in the evaluation of leakage available in the literature. These results could be useful for leakage control or industry criteria design in the future.  ...  In the present research, the leakage in a pipe was evaluated by the virtual entropy generation (VEG) method.  ...  In the calculation of smallest detectable leakage [15] , the inlet boundary condition is P in = 2.6 MPa, inlet mass flow rate is m/ρA.  ... 
doi:10.3390/e20010014 pmid:33265104 fatcat:bixmdpx6urgorjh6jqdj4dm2c4

Security boundaries in mobile ambients

Chiara Braghin, Agostino Cortesi, Riccardo Focardi
2002 Computer languages, systems & structures  
In this way, direct information leakage may be statically detected.  ...  Information leakage may be expressed in terms of the possibility for a hostile ambient to access conÿdential data that are not protected inside a security boundary.  ...  In order to detect information leakages, a typical approach (see, e.g., [4 -9] ) consists in directly deÿning what is an information ow from one level to another one.  ... 
doi:10.1016/s0096-0551(02)00009-7 fatcat:3hh2qrki5vce5aicw6o2f5m73e

A NOVEL LEAKAGE DETECTION AND LOCALIZATION METHOD BASED ON INFRARED THERMOGRAPHY

Nan GE, Guangzheng PENG
2008 Proceedings of the JFPS International symposium on fluid power  
From results, it is shown that the method achieves a good resolution and sensitivity in the application of air-leakage detection and localization.  ...  The common ways used to find leak include traditional bubbling test, ultrasonic positioning and helium mass-spectrometer detection, etc.  ...  In the application of leakage detection and localization based on infrared thermography, leak will be embodied in the images, that is, leak adds some information into thermal images, and it is proved by  ... 
doi:10.5739/isfp.2008.509 fatcat:zg476j72tbdtbi7fh2yvjuy4wy

Checking Integrity via CoPS and Banana: the E-Commerce Case Study

Chiara Braghin, Carla Piazza
2004 Electronical Notes in Theoretical Computer Science  
In the second approach control flow analysis (static analysis) is applied to verify security properties in Mobile Ambient calculus.  ...  In the first one bisimulation equivalences (dynamic verifications) are exploited to verify non-interference security properties on a CCS-like process algebra calculus.  ...  Finally we thank Roberto Zunino for the useful discussion during the Mefisto meeting in Pisa.  ... 
doi:10.1016/j.entcs.2004.02.013 fatcat:lvvtvbf32naulcjnr2zdmmxgn4

The life cycle of a coherent Lagrangian Agulhas ring

Y. Wang, F. J. Beron-Vera, M. J. Olascoaga
2016 Journal of Geophysical Research - Oceans  
Such objectively detected eddies have Lagrangian (material) boundaries that remain coherent (unfilamented) over the detection period.  ...  These boundaries provide effective short-term shielding for the ring, which prevents a large fraction of the ring's interior from being mixed with the ambient turbulent flow.  ...  65-d boundary with the ambient fluid stirred by turbulence.  ... 
doi:10.1002/2015jc011620 fatcat:wwiaxotfgneolhj2eoouj2ouvm

Energy-Efficient Boundary Detection for Continuous Objects in Collaborative Edge Networks

Mengyu Kang, Zhangbing Zhou, Xiaocui Li, Zhensheng Shi
2021 IEEE Access  
Along with a large and increasing number of resource-constrained and battery-powered smart things being deployed in networks, an energy-efficient mechanism for continuous object boundary detection is fundamental  ...  INDEX TERMS Boundary detection, energy efficiency, gas diffusion model, edge networks.  ...  abnormal information in AbnS to ES, return abnormal node information. for periodic detection.  ... 
doi:10.1109/access.2021.3115822 fatcat:mfoapao2rvc5tmpqzyzqug4a44

Beyond Control: Enabling Smart Thermostats For Leakage Detection [article]

Milan Jain, Mridula Gupta, Amarjeet Singh, Vikas Chandan
2019 arXiv   pre-print
We propose Greina - to continuously monitor the readily available ambient information from the thermostat and timely report such leaks.  ...  In this paper, we study smart thermostats for refrigerant leakage detection. Retail outlets, such as milk-booths and quick service restaurants set up cold-rooms to store perishable items.  ...  CONCLUSION In this paper, we discussed an unsupervised self-learning framework, Greina that senses ambient information from smart thermostat for leakage detection.  ... 
arXiv:1901.10580v1 fatcat:kjp6vggobrc35g6t2k7ep7p23q

Detection of Leakages on Composite High Performance Structure Parts

Anja Tripmaker, Hakan Uçan
2017 Lightweight Design worldwide  
Thermography inside Autoclave The ambient conditions in the autoclave provide the boundary conditions for the implementation of an integrated infrared camera system.  ...  In the field of leakage detection, it was shown that it is also possible to detect leakages on vacuum bagging inside the autoclave with the integrated thermographic system.  ... 
doi:10.1007/s41777-017-0006-4 fatcat:pqwv3gfidzcude5dkh7xc6ivlq
« Previous Showing results 1 — 15 out of 12,190 results