Securing information flow via dynamic capture of dependencies
Although static systems for information flow security are well studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new runti...
Gespeichert in:
Veröffentlicht in: | Journal of computer security 2008-01, Vol.16 (5), p.637-688 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 688 |
---|---|
container_issue | 5 |
container_start_page | 637 |
container_title | Journal of computer security |
container_volume | 16 |
creator | Shroff, Paritosh Smith, Scott F. Thober, Mark |
description | Although static systems for information flow security are well studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new runtime information flow system based on the runtime tracking of indirect dependencies between program points. Our system tracks both direct and indirect information flows, and noninterference results are proved. |
doi_str_mv | 10.3233/JCS-2008-0335 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_36117174</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>36117174</sourcerecordid><originalsourceid>FETCH-LOGICAL-c268t-3f6ec7f6505136249d0fbebd618a759ba783c6745d9f026cb35a2575d4cfc323</originalsourceid><addsrcrecordid>eNot0DlPwzAABWALgUQpjOye2Aw-4iMDA6o4VYmhHdgsxwcySuxgJ6D-e1qV6S1PT3ofANcE3zLK2N3baoMoxgphxvgJWBAlOVItbU7BArdUIErlxzm4qPULY0pIqxbgfuPtXGL6hDGFXAYzxZxg6PMv_IkGul0yQ7TQmnGai4c5QOdHn5xPNvp6Cc6C6au_-s8l2D49blcvaP3-_Lp6WCNLhZoQC8JbGQTHnDBBm9bh0PnOCaKM5G1npGJWyIa7NmAqbMe4oVxy19hg99eW4OY4O5b8Pfs66SFW6_veJJ_nqpkgRBLZ7IvoWLQl11p80GOJgyk7TbA-GOm9kT4Y6YMR-wPsUFmg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>36117174</pqid></control><display><type>article</type><title>Securing information flow via dynamic capture of dependencies</title><source>EBSCOhost Business Source Complete</source><creator>Shroff, Paritosh ; Smith, Scott F. ; Thober, Mark</creator><contributor>Sabelfeld, Andrei</contributor><creatorcontrib>Shroff, Paritosh ; Smith, Scott F. ; Thober, Mark ; Sabelfeld, Andrei</creatorcontrib><description>Although static systems for information flow security are well studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new runtime information flow system based on the runtime tracking of indirect dependencies between program points. Our system tracks both direct and indirect information flows, and noninterference results are proved.</description><identifier>ISSN: 0926-227X</identifier><identifier>EISSN: 1875-8924</identifier><identifier>DOI: 10.3233/JCS-2008-0335</identifier><language>eng</language><ispartof>Journal of computer security, 2008-01, Vol.16 (5), p.637-688</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c268t-3f6ec7f6505136249d0fbebd618a759ba783c6745d9f026cb35a2575d4cfc323</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><contributor>Sabelfeld, Andrei</contributor><creatorcontrib>Shroff, Paritosh</creatorcontrib><creatorcontrib>Smith, Scott F.</creatorcontrib><creatorcontrib>Thober, Mark</creatorcontrib><title>Securing information flow via dynamic capture of dependencies</title><title>Journal of computer security</title><description>Although static systems for information flow security are well studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new runtime information flow system based on the runtime tracking of indirect dependencies between program points. Our system tracks both direct and indirect information flows, and noninterference results are proved.</description><issn>0926-227X</issn><issn>1875-8924</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2008</creationdate><recordtype>article</recordtype><recordid>eNot0DlPwzAABWALgUQpjOye2Aw-4iMDA6o4VYmhHdgsxwcySuxgJ6D-e1qV6S1PT3ofANcE3zLK2N3baoMoxgphxvgJWBAlOVItbU7BArdUIErlxzm4qPULY0pIqxbgfuPtXGL6hDGFXAYzxZxg6PMv_IkGul0yQ7TQmnGai4c5QOdHn5xPNvp6Cc6C6au_-s8l2D49blcvaP3-_Lp6WCNLhZoQC8JbGQTHnDBBm9bh0PnOCaKM5G1npGJWyIa7NmAqbMe4oVxy19hg99eW4OY4O5b8Pfs66SFW6_veJJ_nqpkgRBLZ7IvoWLQl11p80GOJgyk7TbA-GOm9kT4Y6YMR-wPsUFmg</recordid><startdate>20080101</startdate><enddate>20080101</enddate><creator>Shroff, Paritosh</creator><creator>Smith, Scott F.</creator><creator>Thober, Mark</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20080101</creationdate><title>Securing information flow via dynamic capture of dependencies</title><author>Shroff, Paritosh ; Smith, Scott F. ; Thober, Mark</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c268t-3f6ec7f6505136249d0fbebd618a759ba783c6745d9f026cb35a2575d4cfc323</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2008</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shroff, Paritosh</creatorcontrib><creatorcontrib>Smith, Scott F.</creatorcontrib><creatorcontrib>Thober, Mark</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Journal of computer security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shroff, Paritosh</au><au>Smith, Scott F.</au><au>Thober, Mark</au><au>Sabelfeld, Andrei</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Securing information flow via dynamic capture of dependencies</atitle><jtitle>Journal of computer security</jtitle><date>2008-01-01</date><risdate>2008</risdate><volume>16</volume><issue>5</issue><spage>637</spage><epage>688</epage><pages>637-688</pages><issn>0926-227X</issn><eissn>1875-8924</eissn><abstract>Although static systems for information flow security are well studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new runtime information flow system based on the runtime tracking of indirect dependencies between program points. Our system tracks both direct and indirect information flows, and noninterference results are proved.</abstract><doi>10.3233/JCS-2008-0335</doi><tpages>52</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0926-227X |
ispartof | Journal of computer security, 2008-01, Vol.16 (5), p.637-688 |
issn | 0926-227X 1875-8924 |
language | eng |
recordid | cdi_proquest_miscellaneous_36117174 |
source | EBSCOhost Business Source Complete |
title | Securing information flow via dynamic capture of dependencies |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T19%3A58%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Securing%20information%20flow%20via%20dynamic%20capture%20of%20dependencies&rft.jtitle=Journal%20of%20computer%20security&rft.au=Shroff,%20Paritosh&rft.date=2008-01-01&rft.volume=16&rft.issue=5&rft.spage=637&rft.epage=688&rft.pages=637-688&rft.issn=0926-227X&rft.eissn=1875-8924&rft_id=info:doi/10.3233/JCS-2008-0335&rft_dat=%3Cproquest_cross%3E36117174%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=36117174&rft_id=info:pmid/&rfr_iscdi=true |