Securing information flow via dynamic capture of dependencies

Although static systems for information flow security are well studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new runti...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of computer security 2008-01, Vol.16 (5), p.637-688
Hauptverfasser: Shroff, Paritosh, Smith, Scott F., Thober, Mark
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 688
container_issue 5
container_start_page 637
container_title Journal of computer security
container_volume 16
creator Shroff, Paritosh
Smith, Scott F.
Thober, Mark
description Although static systems for information flow security are well studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new runtime information flow system based on the runtime tracking of indirect dependencies between program points. Our system tracks both direct and indirect information flows, and noninterference results are proved.
doi_str_mv 10.3233/JCS-2008-0335
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_36117174</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>36117174</sourcerecordid><originalsourceid>FETCH-LOGICAL-c268t-3f6ec7f6505136249d0fbebd618a759ba783c6745d9f026cb35a2575d4cfc323</originalsourceid><addsrcrecordid>eNot0DlPwzAABWALgUQpjOye2Aw-4iMDA6o4VYmhHdgsxwcySuxgJ6D-e1qV6S1PT3ofANcE3zLK2N3baoMoxgphxvgJWBAlOVItbU7BArdUIErlxzm4qPULY0pIqxbgfuPtXGL6hDGFXAYzxZxg6PMv_IkGul0yQ7TQmnGai4c5QOdHn5xPNvp6Cc6C6au_-s8l2D49blcvaP3-_Lp6WCNLhZoQC8JbGQTHnDBBm9bh0PnOCaKM5G1npGJWyIa7NmAqbMe4oVxy19hg99eW4OY4O5b8Pfs66SFW6_veJJ_nqpkgRBLZ7IvoWLQl11p80GOJgyk7TbA-GOm9kT4Y6YMR-wPsUFmg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>36117174</pqid></control><display><type>article</type><title>Securing information flow via dynamic capture of dependencies</title><source>EBSCOhost Business Source Complete</source><creator>Shroff, Paritosh ; Smith, Scott F. ; Thober, Mark</creator><contributor>Sabelfeld, Andrei</contributor><creatorcontrib>Shroff, Paritosh ; Smith, Scott F. ; Thober, Mark ; Sabelfeld, Andrei</creatorcontrib><description>Although static systems for information flow security are well studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new runtime information flow system based on the runtime tracking of indirect dependencies between program points. Our system tracks both direct and indirect information flows, and noninterference results are proved.</description><identifier>ISSN: 0926-227X</identifier><identifier>EISSN: 1875-8924</identifier><identifier>DOI: 10.3233/JCS-2008-0335</identifier><language>eng</language><ispartof>Journal of computer security, 2008-01, Vol.16 (5), p.637-688</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c268t-3f6ec7f6505136249d0fbebd618a759ba783c6745d9f026cb35a2575d4cfc323</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><contributor>Sabelfeld, Andrei</contributor><creatorcontrib>Shroff, Paritosh</creatorcontrib><creatorcontrib>Smith, Scott F.</creatorcontrib><creatorcontrib>Thober, Mark</creatorcontrib><title>Securing information flow via dynamic capture of dependencies</title><title>Journal of computer security</title><description>Although static systems for information flow security are well studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new runtime information flow system based on the runtime tracking of indirect dependencies between program points. Our system tracks both direct and indirect information flows, and noninterference results are proved.</description><issn>0926-227X</issn><issn>1875-8924</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2008</creationdate><recordtype>article</recordtype><recordid>eNot0DlPwzAABWALgUQpjOye2Aw-4iMDA6o4VYmhHdgsxwcySuxgJ6D-e1qV6S1PT3ofANcE3zLK2N3baoMoxgphxvgJWBAlOVItbU7BArdUIErlxzm4qPULY0pIqxbgfuPtXGL6hDGFXAYzxZxg6PMv_IkGul0yQ7TQmnGai4c5QOdHn5xPNvp6Cc6C6au_-s8l2D49blcvaP3-_Lp6WCNLhZoQC8JbGQTHnDBBm9bh0PnOCaKM5G1npGJWyIa7NmAqbMe4oVxy19hg99eW4OY4O5b8Pfs66SFW6_veJJ_nqpkgRBLZ7IvoWLQl11p80GOJgyk7TbA-GOm9kT4Y6YMR-wPsUFmg</recordid><startdate>20080101</startdate><enddate>20080101</enddate><creator>Shroff, Paritosh</creator><creator>Smith, Scott F.</creator><creator>Thober, Mark</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20080101</creationdate><title>Securing information flow via dynamic capture of dependencies</title><author>Shroff, Paritosh ; Smith, Scott F. ; Thober, Mark</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c268t-3f6ec7f6505136249d0fbebd618a759ba783c6745d9f026cb35a2575d4cfc323</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2008</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shroff, Paritosh</creatorcontrib><creatorcontrib>Smith, Scott F.</creatorcontrib><creatorcontrib>Thober, Mark</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Journal of computer security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shroff, Paritosh</au><au>Smith, Scott F.</au><au>Thober, Mark</au><au>Sabelfeld, Andrei</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Securing information flow via dynamic capture of dependencies</atitle><jtitle>Journal of computer security</jtitle><date>2008-01-01</date><risdate>2008</risdate><volume>16</volume><issue>5</issue><spage>637</spage><epage>688</epage><pages>637-688</pages><issn>0926-227X</issn><eissn>1875-8924</eissn><abstract>Although static systems for information flow security are well studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct advantages in precision and in the ability to support dynamically defined policies. To this end, we here develop a new runtime information flow system based on the runtime tracking of indirect dependencies between program points. Our system tracks both direct and indirect information flows, and noninterference results are proved.</abstract><doi>10.3233/JCS-2008-0335</doi><tpages>52</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0926-227X
ispartof Journal of computer security, 2008-01, Vol.16 (5), p.637-688
issn 0926-227X
1875-8924
language eng
recordid cdi_proquest_miscellaneous_36117174
source EBSCOhost Business Source Complete
title Securing information flow via dynamic capture of dependencies
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T19%3A58%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Securing%20information%20flow%20via%20dynamic%20capture%20of%20dependencies&rft.jtitle=Journal%20of%20computer%20security&rft.au=Shroff,%20Paritosh&rft.date=2008-01-01&rft.volume=16&rft.issue=5&rft.spage=637&rft.epage=688&rft.pages=637-688&rft.issn=0926-227X&rft.eissn=1875-8924&rft_id=info:doi/10.3233/JCS-2008-0335&rft_dat=%3Cproquest_cross%3E36117174%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=36117174&rft_id=info:pmid/&rfr_iscdi=true