Добро пожаловать в клуб

Показать / Спрятать  Домой  Новости Статьи Файлы Форум Web ссылки F.A.Q. Логобург    Показать / Спрятать

       
Поиск   
Главное меню
ДомойНовостиСтатьиПостановка звуковФайлыДефектологияКнижный мирФорумСловарьРассылкаКаталог ссылокРейтинг пользователейЧаВо(FAQ)КонкурсWeb магазинШкольникамКарта сайта

Поздравляем!
Поздравляем нового Логобуржца *pchela* со вступлением в клуб!

Реклама

КНИЖНЫЙ МИР

Runtime Verification of Information flow   Mohamed Khalefa Sarrab

Runtime Verification of Information flow

288 страниц. 2011 год.
LAP Lambert Academic Publishing
Standard security mechanism such as Access control, Firewall and Encryption only focus on controlling the release of information but no limitations are placed on controlling the propagation of that confidential information. The principle problem of controlling sensitive information confidentiality starts after access is granted. The research described in this book belongs to the constructive research field where the constructive refers to knowledge contributions being developed as a new framework, theory, model or algorithm. There is currently no monitoring mechanism for controlling information flow during runtime that support behavior configurability and User interaction. Configurability is an important requirement because what is considered to be secure today can be insecure tomorrow. The interaction with users is very important in flexible and reliable security monitoring mechanism because different users may have different security requirements. The interaction with monitoring...
 
- Генерация страницы: 0.04 секунд -