165,886 Hits in 4.9 sec

Secure Information Flow as Typed Process Behaviour [chapter]

Kohei Honda, Vasco Vasconcelos, Nobuko Yoshida
2000 Lecture Notes in Computer Science  
We propose a new type discipline for the π-calculus in which secure information flow is guaranteed by static type checking. Secrecy levels are assigned to channels and are controlled by subtyping.  ...  A behavioural notion of types capturing causality of actions plays an essential role for ensuring safe information flow in diverse interactive behaviours, making the calculus powerful enough to embed known  ...  Then we analyse all cases above to conclude that they work when f is linear as well as non-linear.  ... 
doi:10.1007/3-540-46425-5_12 fatcat:6o6wxnh32bfifeifgoqs5bn7ma

Analysing Flow Security Properties in Virtualised Computing Systems [article]

Chunyan Mu
2020 arXiv   pre-print
A type system of the language is presented to enforce the flow policy and control the leakage introduced by observing behaviours of communicating processes and behaviours of virtual machine (VM) instances  ...  We propose a distributed process algebra CSP_4v with security labelled processes for the purpose of formal modelling of virtualised computing systems.  ...  Security type systems [28, 19, 11, 20, 12, 2, 13] had been substantially used to formulate the analysis of secure information flow in programs.  ... 
arXiv:2004.05500v1 fatcat:if5izpyuwzhbdeb7swoobwkuqe

Combining behavioural types with security analysis

Massimo Bartoletti, Ilaria Castellani, Pierre-Malo Deniélou, Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, Jovanka Pantovic, Jorge A. Pérez, Peter Thiemann, Bernardo Toninho, Hugo Torres Vieira
2015 Journal of Logical and Algebraic Methods in Programming  
This paper offers a unified overview of proposals based on behavioural types which are aimed at the analysis of security properties.  ...  Behavioural types, which extend data types by describing also the structured behaviour of programs, are a widely studied approach to the enforcement of correctness properties in communicating systems.  ...  Acknowledgments We acknowledge support from COST Action IC1201 Behavioural Types for Reliable Large-Scale Software Systems (BETTY) and we thank the members of BETTY working group on Security (WG2) for  ... 
doi:10.1016/j.jlamp.2015.09.003 fatcat:rm7xhow7svfifmi7scszrk6ipm

Blockchain Empowered Federated Learning for Distributed Network Security Behaviour Knowledge Base in 6G

Kun Li, Huachun Zhou, Zhe Tu, Feiyang Liu, Hongke Zhang, Hao Peng
2022 Security and Communication Networks  
In order to effectively reduce malicious flow, we hope to establish a new framework for coordination of security monitoring and malicious behaviour control in 6G network.  ...  Therefore, in this article, we first use the knowledge graph to describe network security behaviours, then build a universal network security malicious behaviour knowledge base, and discuss its application  ...  Flow behaviour includes characteristics such as Flow duration (FD), Flow speed (FS), Flow number (FN), Flow type (FT), and Flow flag (FF).  ... 
doi:10.1155/2022/4233238 fatcat:ysuypnih2nfclcr4x6kcln2awm

Efficient Malware Detection and Tracer Design for Operating System

A. Edwin Robert, M. Hemalatha
2013 Research Journal of Applied Sciences Engineering and Technology  
The other is that, rather than restricting information flow as a traditional MAC does, it traces intruders and restricts only their critical malware behaviours, where intruders represent processes and  ...  label configuration that is widely acknowledged as a tough issue when applying a MAC system in practice.  ...  ., domain and type) of processes and files under the support of intrusion detection and tracing so as to improve usability.PPI automates the generation of information flow policies by analyzing software  ... 
doi:10.19026/rjaset.6.3823 fatcat:56lfvp7za5hajdeb2rrykhhm3i

Security (Hyper-)properties in Workflow Systems: From Specification to Verification

Thomas Bauereiss, Dieter Hutter
2014 Engineering Secure Software and Systems  
We build upon existing verification techniques for a specific notion of information flow security, and intend to apply our results to concrete example systems such as a secure web-based conference management  ...  Challenges include the uniform modelling of different types of security requirements, the decomposition of global security requirements into requirements on subcomponents, and the refinement of an abstract  ...  For a simple while-language, a relation between MAKS security predicates and a language-based notion of information flow security that can be checked using a security type system has been established in  ... 
dblp:conf/essos/BauereissH14 fatcat:e4gffbjx3jgoleuv4kljuxg3zm

An Approximate Framework for Flexible Network Flow Screening

Niall M. Adams, Daniel J. Lawson
2014 2014 IEEE Joint Intelligence and Security Informatics Conference  
This is particularly the case when the structures of interest are embodied as summaries of sets of related traffic, essentially behaviour descriptions.  ...  This paper sketches a methodology to provide such capability, in the context of flow data.  ...  This can include devices, edges, port information, local graph structure.  ... 
doi:10.1109/jisic.2014.49 dblp:conf/isi/AdamsL14 fatcat:qz7vpntov5dvzcxayi22ks2lve

Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture

Andrew Blyth
2014 Journal of Information Security  
Traditional proxy approaches have failed to protect the universe of discourse that a network enabled service can be engaged in as they view all information flows of the same type in a uniform manner.  ...  Introduction Organizations today seek to utilize information technology as part of their business processes.  ...  However such approaches suffer from generating false positive results and the time taken to learn behaviour. • A proxy functions as the man-in-the-middle of an information flow, allowing for the information  ... 
doi:10.4236/jis.2014.52004 fatcat:arsxab7kmjfuho3r7xfcocotqi

Time-sensitive information flow control in timed event-B

Chunyan Mu, Shengchao Qin
2017 2017 International Symposium on Theoretical Aspects of Software Engineering (TASE)  
A typed Event-B model was presented to enforce information flow security and to prevent direct flows introduced by the system.  ...  We suggest a time-sensitive flow security condition for the timed Event-B systems, and present a type system to close the covert channels of timing flows for the system by ensuring the security condition  ...  Type checking for information flow control Event actions may cause information to flow among variables. Secure information flow is described by a secure information flow predicate using typing rules.  ... 
doi:10.1109/tase.2017.8285631 dblp:conf/tase/MuQ17 fatcat:zyq6xpybkfdipm26t5c2u2dpee

Critical infrastructure automated immuno-response system (CIAIRS)

Sahar Badri, Paul Fergus, William Hurst
2016 2016 International Conference on Control, Decision and Information Technologies (CoDIT)  
in the process flow in Figure 24 .  ...  The classification process enables CIAIRS to distinguish between the two types.  ... 
doi:10.1109/codit.2016.7593542 dblp:conf/codit/BadriFH16 fatcat:t4l4fqbv3fdudl4na7vk5o5jfe

Secure information sharing in social agent interactions using information flow analysis

Shahriar Bijani, David Robertson, David Aspinall
2018 Engineering applications of artificial intelligence  
A novel security-typed LCC language is proposed to prevent information leakage.  ...  Focusing on information leakage in choreography systems using LCC, we suggest a framework to detect insecure information flows.  ...  In our security type system, preservation means that expansion of a well-typed term by the LCC rewrite rules is a well-typed term (clause expansion preserves well-typedness).  ... 
doi:10.1016/j.engappai.2018.01.002 fatcat:ebcillzhkvgpfakg2g2xouojle

Information Flow Audit for PaaS Clouds

Thomas F. J.-M. Pasquier, Jatinder Singh, Jean Bacon, David Eyers
2016 2016 IEEE International Conference on Cloud Engineering (IC2E)  
This paper introduces Information Flow Audit, an approach for tracking information flows within cloud infrastructure.  ...  This builds upon CamFlow (Cambridge Flow Control Architecture), a prototype implementation of our model for data-centric security in PaaS clouds.  ...  Acknowledgement This work was supported by UK Engineering and Physical Sciences Research Council grant EP/K011510 CloudSafetyNet: End-to-End Application Security in the Cloud.  ... 
doi:10.1109/ic2e.2016.19 dblp:conf/ic2e/PasquierSBE16 fatcat:avyshu6qvbagzarjvf5o7bvsiu

Analysing the Information Flow Properties of Object-Capability Patterns [chapter]

Toby Murray, Gavin Lowe
2010 Lecture Notes in Computer Science  
Traditional formalisms for reasoning about the security properties of object-capability patterns require one to be aware, a priori, of all possible mechanisms for covert information flow that might be  ...  We show how the CSP process algebra, and its model-checker FDR, can be applied to overcome this limitation.  ...  Definition 3 . 3 An object-capability system captured by the CSP process System = o∈Object (behaviour (o), α(o)) is secure under componen-twise refinement with respect to the information flow property  ... 
doi:10.1007/978-3-642-12459-4_7 fatcat:c7xaa46kq5ejjmbfv3rfjnzzyy

Network Intrusion Detection Using Data Mining and Network Behaviour Analysis

Ahmed Youssef, Ahmed Emam
2011 International Journal of Computer Science & Information Technology (IJCSIT)  
In addition, they require exhaustive manual processing and human expert interference.  ...  They search for potential malicious activities on network traffics; they sometimes succeed to find true security attacks and anomalies.  ...  As opposed to classification, clustering is an unsupervised learning process since no information is available on the labels of the training data.  ... 
doi:10.5121/ijcsit.2011.3607 fatcat:t2gwbabctjafbeyuuo26shnl2a

A methodology for cost-benefit analysis of information security technologies

Wen Zeng
2018 Concurrency and Computation  
Although information security technologies (such as digital rights management products) has been proven effective and successful in protecting the confidentiality of sensitive information by providing  ...  and potential costs incurred by the implementation process.  ...  The impact of these products on business processes and the impact of human behaviour on the effectiveness of information security system have not been documented to date, although human behaviour has been  ... 
doi:10.1002/cpe.5004 fatcat:544fbigeorglji2nwsnszd463u
« Previous Showing results 1 — 15 out of 165,886 results