会议专题

An Overview of Information Flow Security

with the rapid development of computer and network technology, their systems are also attacked increasingly. The conventional security mechanisms such as access control, intrusion detection and encryption only focus on the controls of information release, without fully ensuring end-to-end security. Through analysis methods of information flow in the system, the legality of their information flow can be ensured. This paper overviews the typical models of information flow and their corresponding analysis methods. It briefly describes the applications and comparisons of these methods and also gives the future research directions for them. It concludes that the analysis methods of information flow are feasible to achieve the end-to-end information security.

Information flow security Semantic models Type systems Formal methods

Ling-Ling LIU Ying-Zhou ZHANG

College of Computer,Nanjing Univ.of Posts and Telecom.,Nanjing 210003,China Institute of Computer Technology,Nanjing Univ.of Posts and Telecom.,Nanjing 210003,China

国际会议

2011 3rd International Conference on Computer and Network Technology(ICCNT 2011)(2011第三届IEEE计算机与网络技术国际会议)

太原

英文

653-657

2011-02-26(万方平台首次上网日期,不代表论文的发表时间)