22 September 2017 03:34
Navigation
· Home
· Search
· Downloads
· FAQ
· Contact us
Hydra Information
· Project overview
· Project information
· Partners
· Related projects
· Scientific papers
· Internal articles
· Deliverables
· Hydra online demos
· Web Links
Hydra Newsroom
· News categories
· Hydra in the press
· Events
Users Online
· Guests Online: 1

· Members Online: 0

· Total Members: 146
· Newest Member: rasmus_47
Affiliation
Hydra is affilliated with the following programs and organisations:

The Hydra coordinater FhG FIT is a member of ARTEMISIA, the association for R&D actors in the field of ARTEMIS: Advanced Research & Technology for EMbedded Intelligence and Systems.


The Hydra middleware allows developers to create inclusive applications with a high degree of accessibility for all. The Hydra project supports the Commissions campaign: eInclusion - be part of it!



The Hydra project is part of the Cluster of European projects on the Internet of Things. The Cluster aims to promote a common vision of the Internet of Things.


Fight Spam
Downloads: A Policy Model for Secure Information Flow
Downloads Home > Scientific papers > A Policy Model for Secure Information Flow

A Policy Model for Secure Information Flow 1.0


Adedayo O. Adetoye and Atta Badii, School of Systems Engineering, University of Reading, UK:

This paper proposes a policy model to specify what information flow is permitted in a computational system. The security definition, which is based on a general notion of information lattices, allows various representations of information to be used in the enforcement of secure information flow in terministic or nondeterministic systems. A flexible semantics-based analysis technique is presented, which uses the input-output relational model induced by an attacker’s observational power, to compute the information released by the computational system. An illustrative attacker model demonstrates the use of the technique to develop a termination-sensitive analysis. The technique allows the development of various information flow analyses, parametrised by the ttacker’s observational power, which can be used to enforce what declassification policies.

The paper was presented at the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS\'09), 28-29 March, 2009 in York, UK.
Calendar
Admin
29 April 2009 10:28
Downloads
Download 2915
Info
Version: 1.0
License: ACM subscription
O/S: pdf

Download:
Download
(190 KB)
Download Stats Downloads: 100
Downloaded: 128670
Most Downloaded: A Survey of Context-aware Middleware [ 5320 ]
Most Recent: Hydra - LinkSmart brochure [ 1308 ]
About Hydra
The Hydra project is co-funded by the European Commission within the Sixth Framework Programme in the area of Networked Embedded Systems under contract IST-2005-034891



On-line Demo

Why not see the on-line Hydrademo? You can turn on and off devices and follow the energy consumption in real time. Just click on the picture and you see it!

News
Massive Hydra (or Li...
The Hydra project is...
Final training cours...
A new FP7 Project Ma...
The Hydra project co...
Ethics training mate...
Watch a demonstratio...
The Hydra project on...
Congratulations to t...
The famous German iX...
Popular Downloads
A Survey of Context... 5320
Network Embedded Sy... 5097
Towards Semantic Re... 4332
Use of Semantic Tec... 3693
Hydra newsletter Ma... 3479
Login
Username

Password



Forgotten your password?
Request a new one here.
1,678,393 unique visits