Title :
On information flow security models
Author_Institution :
Center for Secure Inf. Technol., Naval Res. Lab., Washington, DC, USA
Abstract :
Prior work is discussed and positions are given on the following two questions: (1) What basis should be used to evaluate information flow security models? and (2) What should the scope of an information flow security model be? As part of the position on question (1), a reformulation of McLean´s FM (1990) is given
Keywords :
security of data; information flow security models; Cryptography; Data security; Equations; High performance computing; Information security; Information theory; Mutual information; Performance analysis; Protection;
Conference_Titel :
Computer Security Foundations Workshop IV, 1991. Proceedings
Conference_Location :
Franconia, NH
Print_ISBN :
0-8186-2215-6
DOI :
10.1109/CSFW.1991.151569