Users Online Now
» Guests Online: 1

» Members Online: 0

» Total Members: 1
» Newest Member: Admin
Hydra is affilliated with the following programs and organisations:

The Hydra coordinater FhG FIT is a member of ARTEMISIA, the association for R&D actors in the field of ARTEMIS: Advanced Research & Technology for EMbedded Intelligence and Systems.

The Hydra middleware allows developers to create inclusive applications with a high degree of accessibility for all. The Hydra project supports the Commissions campaign: eInclusion - be part of it!

The Hydra project is part of the Cluster of European projects on the Internet of Things. The Cluster aims to promote a common vision of the Internet of Things.

The Hydra project is co-funded by the European Commission within the Sixth Framework Programme in the area of Networked Embedded Systems under contract IST-2005-034891

Why not see the on-line Hydrademo? You can turn on and off devices and follow the energy consumption in real time. Just click on the picture and you see it!

Popular Downloads
Sign In
Enter Username


Forgot Password?
Downloads: A Policy Model for Secure Information Flow
Downloads Home > Scientific papers > A Policy Model for Secure Information Flow

A Policy Model for Secure Information Flow 1.0

Adedayo O. Adetoye and Atta Badii, School of Systems Engineering, University of Reading, UK:

This paper proposes a policy model to specify what information flow is permitted in a computational system. The security definition, which is based on a general notion of information lattices, allows various representations of information to be used in the enforcement of secure information flow in terministic or nondeterministic systems. A flexible semantics-based analysis technique is presented, which uses the input-output relational model induced by an attacker’s observational power, to compute the information released by the computational system. An illustrative attacker model demonstrates the use of the technique to develop a termination-sensitive analysis. The technique allows the development of various information flow analyses, parametrised by the ttacker’s observational power, which can be used to enforce what declassification policies.

The paper was presented at the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS\'09), 28-29 March, 2009 in York, UK.
29 April 2009 09:28
Download 4082
Version: 1.0
License: ACM subscription
O/S: pdf

(190 KB)
Download Stats Downloads: 100
Downloaded: 227940
Most Downloaded: A Survey of Context-aware Middleware [ 8049 ]
Most Recent: Hydra - LinkSmart brochure [ 3045 ]