Title :
An Alternative Approach to Confidentiality Analysis
Author :
Xiaochao, Zi ; Lihong, Yao ; Li, Pan
Author_Institution :
Sch. of Inf. Security Eng., Shanghai JiaoTong Univ.
Abstract :
Access control mechanisms can´t efficiently restrict hidden information flow, and confidential information can stealthily leak out with hidden information flow. We outline a state-based approach to analyzing hidden information flow. The main idea of the approach is to model secure systems as finite automata, and analyze the properties of information flow by studying the characteristic of the finite automata
Keywords :
authorisation; data encapsulation; data flow analysis; data privacy; finite automata; access control; confidential information; confidentiality analysis; finite automata; hidden information flow; secure systems; Access control; Automata; Information analysis; Information security; Operating systems; Permission;
Conference_Titel :
Computational Intelligence and Security, 2006 International Conference on
Conference_Location :
Guangzhou
Print_ISBN :
1-4244-0605-6
Electronic_ISBN :
1-4244-0605-6
DOI :
10.1109/ICCIAS.2006.295325