Illegal Information Flow Detection in Electronic Institution
暂无分享,去创建一个
Due to the lack of information flow control mechanism, the authorization model of an electronic institution (EI) may bring illegal information propagation threatening the confidentiality of sensitive data. By analyzing information flows among roles, algorithms for detecting and controlling potential illegal information flows in EIs are designed. The algorithms are applied to simulating classic cases. The experiments show the proposed algorithms can prevent unauthorized information leakage and enhance securities of EI based systems.
[1] Shih-Chien Chou,et al. Managing role relationships in an information flow control model , 2006, J. Syst. Softw..
[2] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .