Runtime monitoring and controlling of Information flow.
Computer systems are monitored to check performance or verified to check the correctness of the software systems with respect to security properties such as integrity, availability and confidentiality. The more sensitive the information, such as credit card information, military information or personal medical information, being processed by the software, the more necessary and important it is to monitor and control the flow of sensitive information. Monitoring and controlling an untrusted program behavior to ensure information confidentiality during runtime in an environment where confidential information is present is often difficult and unnerving task for users. The issue is how users can monitor and control the flow of the confidential information at the runtime of untrusted programs. In this paper we present a novel runtime verification approach for monitoring and controlling information flow that supports user interaction with a running program.
Citation : Sarrab, M. and Janicke, H. (2010) Runtime monitoring and controlling of information flow. International Journal of Computer Science and Information Security (IJCSIS), 8 (9), pp. 37-45
ISSN : 1947-5500
Research Group : Software Technology Research Laboratory (STRL)
Research Institute : Cyber Technology Institute (CTI)