Runtime monitoring and controlling of Information flow.

De Montfort University Open Research Archive

Show simple item record Sarrab, Mohamed en Janicke, Helge en 2012-04-04T14:45:32Z 2012-04-04T14:45:32Z 2010
dc.identifier.citation Sarrab, M. and Janicke, H. (2010) Runtime monitoring and controlling of information flow. International Journal of Computer Science and Information Security (IJCSIS), 8 (9), pp. 37-45 en
dc.identifier.issn 1947-5500
dc.description.abstract Computer systems are monitored to check performance or verified to check the correctness of the software systems with respect to security properties such as integrity, availability and confidentiality. The more sensitive the information, such as credit card information, military information or personal medical information, being processed by the software, the more necessary and important it is to monitor and control the flow of sensitive information. Monitoring and controlling an untrusted program behavior to ensure information confidentiality during runtime in an environment where confidential information is present is often difficult and unnerving task for users. The issue is how users can monitor and control the flow of the confidential information at the runtime of untrusted programs. In this paper we present a novel runtime verification approach for monitoring and controlling information flow that supports user interaction with a running program. en
dc.language.iso en en
dc.subject information flow control en
dc.subject runtime monitoring en
dc.subject confidentiality en
dc.subject usability en
dc.title Runtime monitoring and controlling of Information flow. en
dc.type Article en
dc.researchgroup Software Technology Research Laboratory (STRL) en
dc.ref2014.selected 1367395509_0410680124787_11_3

Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record