Expressing Information Flow Properties:
This concise overview of such a diverse topic provides the reader with an invaluable reference when implementing security technologies into all types of information systems. It is particularly useful for students, researchers and practitioners working on modern day information security problems
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Norwell, MA
Now Publishers
2022
|
Ausgabe: | 1st ed |
Schriftenreihe: | Foundations and Trends in Privacy and Security Series
volume 3, issue 1 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | This concise overview of such a diverse topic provides the reader with an invaluable reference when implementing security technologies into all types of information systems. It is particularly useful for students, researchers and practitioners working on modern day information security problems |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 110 pages |
ISBN: | 9781680839364 |
Internformat
MARC
LEADER | 00000nam a22000001cb4500 | ||
---|---|---|---|
001 | BV048211717 | ||
003 | DE-604 | ||
005 | 20220620 | ||
007 | t | ||
008 | 220511s2022 |||| 00||| eng d | ||
020 | |a 9781680839364 |9 978-1-68083-936-4 | ||
035 | |a (OCoLC)1334023471 | ||
035 | |a (DE-599)BVBBV048211717 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Kozyri, Elisavet |d ca. 20./21. Jh. |e Verfasser |0 (DE-588)1260086321 |4 aut | |
245 | 1 | 0 | |a Expressing Information Flow Properties |
250 | |a 1st ed | ||
264 | 1 | |a Norwell, MA |b Now Publishers |c 2022 | |
300 | |a 110 pages | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Foundations and Trends in Privacy and Security Series |v volume 3, issue 1 | |
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | 3 | |a This concise overview of such a diverse topic provides the reader with an invaluable reference when implementing security technologies into all types of information systems. It is particularly useful for students, researchers and practitioners working on modern day information security problems | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationsfluss |0 (DE-588)4161668-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Informationsfluss |0 (DE-588)4161668-6 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Chong, Stephen |0 (DE-588)1260086658 |4 ctb | |
700 | 1 | |a Myers, Andrew C. |0 (DE-588)126008681X |4 ctb | |
776 | 0 | |z 9781680839364 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-68083-937-1 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033592561&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-033592561 |
Datensatz im Suchindex
_version_ | 1804183984955981824 |
---|---|
adam_text | Contents 1 Introduction 1.1 Information Flow Properties for Today s Digital Society . . 1.2 Relation to Privacy, Access Control, and Cryptography . . 1.3 Information Flow Properties are Hyperproperties................ 1.4 Labels and Security Conditions............................................ 1.5 Enforcing Information Flow Properties............................... 1.6 Scope of the Monograph and Terminology......................... 3 3 4 6 6 8 9 2 Noninterference 11 3 Labels 3.1 Representing Restrictions..................................................... 3.2 Axioms for Flow Relations..................................................... 3.3 From Labels to Noninterference............................................ 3.4 Associating Data with Labels............................................... 17 18 19 22 23 4 Threat Model 4.1 Information Channels........................................................... 4.2 Termination.......................................................................... 4.3 Time....................................................................................... 4.4 Interaction.............................................................................. 4.5 Program Code........................................................................ 4.6 Views....................................................................................... 27 27 28 30 31 33 34
5 Computational Models 37 5.1 Nondeterminism......................................................................... 37 5.2 Composition of Systems........................................................... 40 5.3 Concurrency............................................................................... 42 6 Reclassification 6.1 Reclassification Conditions ..................................................... 6.2 Robustness.................................................................................. 6.3 Knowledge-based Semantics ..................................................... 47 49 60 62 7 Information Flow Policies and Authorization 65 7.1 Information Flow Policies versusAccess Control Policies . . 65 7.2 Authorization for Information Flow Policies.......................... 67 7.3 Information Flow Principles for Authorization .................... 69 8 Quantitative Information Flow Properties 8.1 Expressing Policies..................................................................... 8.2 Varying the Threat and Computational Model..................... 73 9 Future Directions 79 Acknowledgements 83 References 85 74 75
|
adam_txt |
Contents 1 Introduction 1.1 Information Flow Properties for Today's Digital Society . . 1.2 Relation to Privacy, Access Control, and Cryptography . . 1.3 Information Flow Properties are Hyperproperties. 1.4 Labels and Security Conditions. 1.5 Enforcing Information Flow Properties. 1.6 Scope of the Monograph and Terminology. 3 3 4 6 6 8 9 2 Noninterference 11 3 Labels 3.1 Representing Restrictions. 3.2 Axioms for Flow Relations. 3.3 From Labels to Noninterference. 3.4 Associating Data with Labels. 17 18 19 22 23 4 Threat Model 4.1 Information Channels. 4.2 Termination. 4.3 Time. 4.4 Interaction. 4.5 Program Code. 4.6 Views. 27 27 28 30 31 33 34
5 Computational Models 37 5.1 Nondeterminism. 37 5.2 Composition of Systems. 40 5.3 Concurrency. 42 6 Reclassification 6.1 Reclassification Conditions . 6.2 Robustness. 6.3 Knowledge-based Semantics . 47 49 60 62 7 Information Flow Policies and Authorization 65 7.1 Information Flow Policies versusAccess Control Policies . . 65 7.2 Authorization for Information Flow Policies. 67 7.3 Information Flow Principles for Authorization . 69 8 Quantitative Information Flow Properties 8.1 Expressing Policies. 8.2 Varying the Threat and Computational Model. 73 9 Future Directions 79 Acknowledgements 83 References 85 74 75 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Kozyri, Elisavet ca. 20./21. Jh |
author2 | Chong, Stephen Myers, Andrew C. |
author2_role | ctb ctb |
author2_variant | s c sc a c m ac acm |
author_GND | (DE-588)1260086321 (DE-588)1260086658 (DE-588)126008681X |
author_facet | Kozyri, Elisavet ca. 20./21. Jh Chong, Stephen Myers, Andrew C. |
author_role | aut |
author_sort | Kozyri, Elisavet ca. 20./21. Jh |
author_variant | e k ek |
building | Verbundindex |
bvnumber | BV048211717 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1334023471 (DE-599)BVBBV048211717 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 1st ed |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02159nam a22004571cb4500</leader><controlfield tag="001">BV048211717</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220620 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">220511s2022 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781680839364</subfield><subfield code="9">978-1-68083-936-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1334023471</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048211717</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kozyri, Elisavet</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1260086321</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Expressing Information Flow Properties</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Norwell, MA</subfield><subfield code="b">Now Publishers</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">110 pages</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Foundations and Trends in Privacy and Security Series</subfield><subfield code="v">volume 3, issue 1</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">This concise overview of such a diverse topic provides the reader with an invaluable reference when implementing security technologies into all types of information systems. It is particularly useful for students, researchers and practitioners working on modern day information security problems</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationsfluss</subfield><subfield code="0">(DE-588)4161668-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationsfluss</subfield><subfield code="0">(DE-588)4161668-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chong, Stephen</subfield><subfield code="0">(DE-588)1260086658</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Myers, Andrew C.</subfield><subfield code="0">(DE-588)126008681X</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="z">9781680839364</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-68083-937-1</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033592561&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033592561</subfield></datafield></record></collection> |
id | DE-604.BV048211717 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:48:43Z |
indexdate | 2024-07-10T09:32:08Z |
institution | BVB |
isbn | 9781680839364 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033592561 |
oclc_num | 1334023471 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | 110 pages |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Now Publishers |
record_format | marc |
series2 | Foundations and Trends in Privacy and Security Series |
spelling | Kozyri, Elisavet ca. 20./21. Jh. Verfasser (DE-588)1260086321 aut Expressing Information Flow Properties 1st ed Norwell, MA Now Publishers 2022 110 pages txt rdacontent n rdamedia nc rdacarrier Foundations and Trends in Privacy and Security Series volume 3, issue 1 Description based on publisher supplied metadata and other sources This concise overview of such a diverse topic provides the reader with an invaluable reference when implementing security technologies into all types of information systems. It is particularly useful for students, researchers and practitioners working on modern day information security problems Computersicherheit (DE-588)4274324-2 gnd rswk-swf Informationsfluss (DE-588)4161668-6 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Informationsfluss (DE-588)4161668-6 s Privatsphäre (DE-588)4123980-5 s DE-604 Chong, Stephen (DE-588)1260086658 ctb Myers, Andrew C. (DE-588)126008681X ctb 9781680839364 Erscheint auch als Online-Ausgabe 978-1-68083-937-1 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033592561&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Kozyri, Elisavet ca. 20./21. Jh Expressing Information Flow Properties Computersicherheit (DE-588)4274324-2 gnd Informationsfluss (DE-588)4161668-6 gnd Privatsphäre (DE-588)4123980-5 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4161668-6 (DE-588)4123980-5 |
title | Expressing Information Flow Properties |
title_auth | Expressing Information Flow Properties |
title_exact_search | Expressing Information Flow Properties |
title_exact_search_txtP | Expressing Information Flow Properties |
title_full | Expressing Information Flow Properties |
title_fullStr | Expressing Information Flow Properties |
title_full_unstemmed | Expressing Information Flow Properties |
title_short | Expressing Information Flow Properties |
title_sort | expressing information flow properties |
topic | Computersicherheit (DE-588)4274324-2 gnd Informationsfluss (DE-588)4161668-6 gnd Privatsphäre (DE-588)4123980-5 gnd |
topic_facet | Computersicherheit Informationsfluss Privatsphäre |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033592561&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kozyrielisavet expressinginformationflowproperties AT chongstephen expressinginformationflowproperties AT myersandrewc expressinginformationflowproperties |