Abstractions for Usable Information Flow Control in Aeolus

نویسندگان

  • Winnie Cheng
  • Dan R. K. Ports
  • David A. Schultz
  • Victoria Popic
  • Aaron Blankstein
  • James A. Cowling
  • Dorothy Curtis
  • Liuba Shrira
  • Barbara Liskov
چکیده

ions for Usable Information Flow Control in Aeolus Winnie Cheng∗ Dan R. K. Ports David Schultz Victoria Popic† Aaron Blankstein‡ James Cowling Dorothy Curtis Liuba Shrira§ Barbara Liskov MIT CSAIL ∗IBM Research †Stanford ‡Princeton §Brandeis

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information flow for secure distributed applications

Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage enterprise reputations, and cost billion of dollars. While distributed computing architectures provide data and service integration, they also create information flow control probl...

متن کامل

Analyzing Audit Trails in the Aeolus Security Platform

This thesis presents the design and implementation of an analysis system for audit trails generated by Aeolus, a distributed security platform based on information flow control. Previous work focused on collecting these audit trails in the form of event logs. This thesis presents a model for representing these events and a system for analyzing them. In addition to allowing users to issue SQL qu...

متن کامل

Information and data flow analysis for forestry sector in Iran as a basic requirement for designing a forest information system (FIS)

ABSTRACT The aim of this study was to evaluate the status of information on forest and data transfer and to identify the gaps in information and data flow in forestry sector in Iran. The study evaluated the data and information flow in three levels (control offices level, provincial offices level and organizational offices level) using the document analysis and questioning (interviews and ques...

متن کامل

Runtime Monitoring Using Policy Based Approach to Control Information Flow for Mobile Apps

Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as Availability, Integrity and Confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the informati...

متن کامل

Collecting Graphical Abstract Views of Mercury Program Executions

A program execution monitor is a program that collects and abstracts information about program executions. The collect operator is a high level, general purpose primitive which lets users implement their own monitors. Collect is built on top of the Mercury trace. In previous work, we have demonstrated how this operator can be used to efficiently collect various kinds of statistics about Mercury...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012