Enhance the security properties and information flow control

被引:0
|
作者
机构
[1] El Moussaid, Nadya
[2] El Azhari, Maryam
关键词
Cloud security - Flow control - Security systems;
D O I
10.1504/IJEB.2020.109068
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Information Flow for Security in Control Systems
    Weerakkody, Sean
    Sinopoli, Bruno
    Kar, Soummya
    Datta, Anupam
    [J]. 2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 5065 - 5072
  • [2] Comparing two information flow security properties
    Focardi, R
    [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 116 - 122
  • [3] Information Flow Control with Decentralized Labeling Model in Information Security
    Hakkoymaz, Veli
    Bakir, Cigdem
    [J]. JOURNAL OF WEB ENGINEERING, 2020, 19 (7-8): : 903 - 930
  • [4] Access Control and Information Flow Control for Web Services Security
    Kedjar, Saadia
    Tari, Abdelkamel
    Bertok, Peter
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2016, 11 (01) : 44 - 76
  • [5] The compositional security checker: A tool for the verification of information flow security properties
    Focardi, R
    Gorrieri, R
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1997, 23 (09) : 550 - 571
  • [6] Dynamic security labels and static information flow control
    Lantian Zheng
    Andrew C. Myers
    [J]. International Journal of Information Security, 2007, 6 : 67 - 84
  • [7] Security Information Flow Control Model and Method in MILS
    Zhou Yinping
    Shen Yulong
    Pei Qingqi
    Cui Xining
    Li Yahui
    [J]. PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 591 - 595
  • [8] Dynamic security labels and static information flow control
    Zheng, Lantian
    Myers, Andrew C.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (2-3) : 67 - 84
  • [9] IFCaaS: Information Flow Control as a Service for Cloud Security
    Elsayed, Marwa
    Zulkernine, Mohammad
    [J]. PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 211 - 216
  • [10] Verification of control flow based security properties
    Jensen, T
    Le Métayer, D
    Thorn, T
    [J]. PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, : 89 - 103