Back to Search
Start Over
Random Sampling over Streaming Window Joins
- Source :
- The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
- Publication Year :
- 2007
- Publisher :
- IEEE, 2007.
-
Abstract
- In this paper, we introduce a new information flow model for trusted computing systems.Different from traditional system protection models, such as access control matrix model, this model analyze the information flow in the system by tracing the operation sequences , and explains that the security status of a trusted computing system is the security attributes of information flows from input port to output port.With this model, we discuss the information channels in a trusted computing systems, and propose a "normal information flow theorem" which gives a necessary condition of the existence of normal information flow.
- Subjects :
- Cloud computing security
Computer science
business.industry
Covert channel
Data security
Trusted Computing
Computer security model
Computer security
computer.software_genre
Trusted computing base
Direct Anonymous Attestation
Information flow (information theory)
business
computer
Computer Science::Cryptography and Security
Computer network
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007)
- Accession number :
- edsair.doi...........7013cd7f191f6a0afe417106b4e77c11