Information flow control and applications - Bridging a gap

64Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The development of formal security models is a difficult, time consuming, and expensive task. This development burden can be consid-erably reduced by using generic security models. In a security model, confidentiality as well as integrity requirements can be expressed by restrictions on the information flow. Generic models for controling information flow in distributed systems have been thoroughly investigated. Nevertheless, the known approaches cannot cope with common features of secure distributed systems like channel control, information filters, or explicit downgrading. This limitation caused a major gap which has prevented the migration of a large body of research into practice. To bridge this gap is the main goal of this article. © Springer-Verlag Berlin Heidelberg 2001.

Cite

CITATION STYLE

APA

Mantel, H. (2001). Information flow control and applications - Bridging a gap. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2021 LNCS, pp. 153–172). Springer Verlag. https://doi.org/10.1007/3-540-45251-6_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free