Secure information sharing in social agent interactions using information flow analysis

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Iranian faculty information sharing in social networks: the case of Shahid Chamran University

Purpose. the purpose of this research is to analyze scientific information sharing of Shahid Chamran University of Ahvaz faculty in social networks.Method. This study which is conducted through quantitative and qualitative methods, is an applied research in terms of aim, and is of a descriptive-analytic type in nature. The population included all faculty members of Shahid Chamran Universi...

متن کامل

Toward Secure and Credible Information Sharing Using Information Supply Chains

Information assurance and information sharing are two contradictory yet important tasks in a distributed and information rich environment. Many reports regarding intelligence failures on preventing the Sep 11’s tragic events challenge the current information technologies that are often segregated for easiness of information assurance and demand systems that better support information sharing re...

متن کامل

Sharing @ The Edge: Secure Information Sharing

Peer-to-peer (P2P) computing promises to return the World Wide Web to an environment where the edge of the network is as important as the Web servers that have dominated its early years. This paper describes issues associated with P2P computing that must be solved before widespread deployment is possible. The paper presents a P2P solution where services and content are equally secured and can b...

متن کامل

Principles of Secure Information Flow Analysis

In today's world of the Internet, the WorldWide Web, and Google, information is more accessible than ever before. An unfortunate corollary is that it is harder than ever to protect the privacy of sensitive information. In this paper, we explore a technique called secure information flow analysis. Suppose that some sensitive information is stored on a computer system. How can we prevent it from ...

متن کامل

Information Flow Analysis for Fail-Secure Devices

(2005) Information flow analysis for fail-secure devices. Information security devices must preserve security properties even in the presence of faults. This in turn requires a rigorous evaluation of the system behaviours resulting from component failures, especially how such failures affect information flow. We introduce a compositional method of static analysis for fail-secure behaviour. Our ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Engineering Applications of Artificial Intelligence

سال: 2018

ISSN: 0952-1976

DOI: 10.1016/j.engappai.2018.01.002