To see the other types of publications on this topic, follow the link: Information flow.

Dissertations / Theses on the topic 'Information flow'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Information flow.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Heusser, Jonathan. "Automating quantitative information flow." Thesis, Queen Mary, University of London, 2011. http://qmro.qmul.ac.uk/xmlui/handle/123456789/1260.

Full text
Abstract:
Unprecedented quantities of personal and business data are collected, stored, shared, and processed by countless institutions all over the world. Prominent examples include sharing personal data on social networking sites, storing credit card details in every store, tracking customer preferences of supermarket chains, and storing key personal data on biometric passports. Confidentiality issues naturally arise from this global data growth. There are continously reports about how private data is leaked from confidential sources where the implications of the leaks range from embarrassment to seri
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Xiang. "Efficiency in Emergency medical service system : An analysis on information flow." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1620.

Full text
Abstract:
<p>In an information system which includes plenty of information services, we are always seeking a solution to enhance efficiency and reusability. Emergency medical service system is a classic information system using application integration in which the requirement of information flow transmissions is extremely necessary. We should always ensure this system is running in best condition with highest efficiency and reusability since the efficiency in the system directly affects human life.</p><p>The aim of this thesis is to analysis emergency medical system in both qualitative and quantitative
APA, Harvard, Vancouver, ISO, and other styles
3

Aksakal, Baris. "Makeshift Information Constructions: Information Flow and Undercover Police." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4823/.

Full text
Abstract:
This dissertation presents the social virtual interface (SVI) model, which was born out of a need to develop a viable model of the complex interactions, information flow and information seeking behaviors among undercover officers. The SVI model was created from a combination of various philosophies and models in the literature of information seeking, communication and philosophy. The questions this research paper answers are as follows: 1. Can we make use of models and concepts familiar to or drawn from Information Science to construct a model of undercover police work that effectively repr
APA, Harvard, Vancouver, ISO, and other styles
4

Enescu, Mihai Adrian. "Precisely quantifying software information flow." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/57379.

Full text
Abstract:
A common attack point in a program is the input exposed to the user. The adversary crafts a malicious input that alters some internal state of the program, in order to acquire sensitive data, or gain control of the program's execution. One can say that the input exerts a degree of influence over specific program outputs. Although a low degree of influence does not guarantee the program's resistance to attacks, previous work has argued that a greater degree of influence tends to provide an adversary with an easier avenue of attack, indicating a potential security vulnerability. Quantitative in
APA, Harvard, Vancouver, ISO, and other styles
5

Zhu, Ping. "Quantifying information flow with constraints." Thesis, City University London, 2010. http://openaccess.city.ac.uk/12101/.

Full text
Abstract:
Quantifying flow of information in a program involves calculating how much information (e.g. about secret inputs) can be leaked by observing the program's public outputs. Recently this field has attracted a lot of research interest, most of which makes use of Shannon's information theory, e.g. mutual information, conditional entropy, etc. Computability entails that any automated analysis of information is necessarily incomplete. Thus quantitative flow of analyses aim to compute upper bounds on the sizes of the flows in a program. Virtually all the current quantitative analyses treat program va
APA, Harvard, Vancouver, ISO, and other styles
6

Moses, John. "Cohesion prediction using information flow." Thesis, University of Sunderland, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.387492.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Payne, Joshua. "Interaction Topologies and Information Flow." ScholarWorks @ UVM, 2009. http://scholarworks.uvm.edu/graddis/177.

Full text
Abstract:
Networks are ubiquitous, underlying systems as diverse as the Internet, food webs, societal interactions, the cell, and the brain. Of crucial importance is the coupling of network structure with system dynamics, and much recent attention has focused on how information, such as pathogens, mutations, or ideas, ow through networks. In this dissertation, we advance the understanding of how network structure a ects information ow in two important classes of models. The rst is an independent interaction model, which is used to investigate the propagation of advantageous alleles in evoluti
APA, Harvard, Vancouver, ISO, and other styles
8

Alhalalat, Saleh Ismail. "Information flow in virtual organisations." Thesis, Loughborough University, 2005. https://dspace.lboro.ac.uk/2134/7757.

Full text
Abstract:
The main aim of the study is to investigate the flows of information and the impact and added value of Information and Communication Technologies (ICTs) on the integration of information flows. This concept is related to the optimal design of organisational (and other) systems that allow the right decision to be made by the right person at the right time in an appropriate location. Clearly, information that is often distributed needs to come together in an efficient way to allow the best use of resources to maximize the information value. The virtual organisation (VO) is a new style of working
APA, Harvard, Vancouver, ISO, and other styles
9

Salvini, Fabio <1992&gt. "Flow logic based information flow analysis of Android applications." Master's Degree Thesis, Università Ca' Foscari Venezia, 2018. http://hdl.handle.net/10579/12996.

Full text
Abstract:
Android is the world's most popular mobile OS, with more than 2 billion monthly active devices. Static analysis is an essential tool to protect the sensitive data stored in the devices from malicious applications. In this thesis, we present the first flow logic for the information flow analysis of Dalvik bytecode that is specifically tailored to the peculiar lifecycle of Android applications. A prototype implementation based on a state-of-the-art SMT solver demonstrates the practicality of our approach.
APA, Harvard, Vancouver, ISO, and other styles
10

Bhatia, Shishir. "Structured Information Flow (SIF) Framework for Automating End-to-End Information Flow for Large Organizations." Thesis, Virginia Tech, 2006. http://hdl.handle.net/10919/31148.

Full text
Abstract:
For almost five decades, since the advent of the first computers for commercial use, the dream of the Paperless Office, a.k.a. total Information flow automation, has eluded the industry. Now, with the emergence of Internet- and Web-based technologies, daily we see examples of organizations like eBay and Amazon that perform their business in a fully automated manner without the use of paper or pen. However, bigger and older organizations that have more complex functions, like government organizations, have not been very successful in harnessing the latest technological innovations to completely
APA, Harvard, Vancouver, ISO, and other styles
11

Kassir, Abdallah. "Communication Efficiency in Information Gathering through Dynamic Information Flow." Thesis, The University of Sydney, 2014. http://hdl.handle.net/2123/12113.

Full text
Abstract:
This thesis addresses the problem of how to improve the performance of multi-robot information gathering tasks by actively controlling the rate of communication between robots. Examples of such tasks include cooperative tracking and cooperative environmental monitoring. Communication is essential in such systems for both decentralised data fusion and decision making, but wireless networks impose capacity constraints that are frequently overlooked. While existing research has focussed on improving available communication throughput, the aim in this thesis is to develop algorithms that make more
APA, Harvard, Vancouver, ISO, and other styles
12

Zanioli, Matteo <1984&gt. "Information flow analysis by abstract interpretation." Doctoral thesis, Università Ca' Foscari Venezia, 2012. http://hdl.handle.net/10579/1235.

Full text
Abstract:
Protecting the confidentiality of information stored in a computer system or transmitted over a public network is a relevant problem in computer security. The goal of this thesis is to provide both theoretical and experimental results towards the design of an information flow analysis for the automatic verification of absence of sensitive information leakage. Our approach is based on Abstract Interpretation, a theory of sound approximation of program semantics. We track the dependencies among program's variables using propositional formulae, namely the Pos domain. We study the main ways to imp
APA, Harvard, Vancouver, ISO, and other styles
13

Masri, Wassim. "DYNAMIC INFORMATION FLOW ANALYSIS, SLICING AND PROFILING." Case Western Reserve University School of Graduate Studies / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=case1092886961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Thorpe, Tony. "Information flow in house building organisations." Thesis, Loughborough University, 1992. https://dspace.lboro.ac.uk/2134/6751.

Full text
Abstract:
This research describes an investigation into the information flows within the technical and commercial functions of house building organisations. It was initiated because of the evidence of poor data transfer and communications within the construction industry as identified by previous research. Little previous research had addressed the particular problems of the house building industry which accounts for up to a third of total new construction output in the UK. The organisational and information structures of six house building companies were examined and a typical organisational model deve
APA, Harvard, Vancouver, ISO, and other styles
15

Adetoye, Adedayo Oyelakin. "Secure information flow : analysis and enforcement." Thesis, University of Birmingham, 2009. http://etheses.bham.ac.uk//id/eprint/408/.

Full text
Abstract:
When a computer program requires legitimate access to confidential data, the question arises whether such a program may reveal sensitive information to an unauthorised observer. There is therefore a need to ensure that a program, which processes confidential data, is free of unwanted information flow. This thesis presents a formal framework for the analysis and enforcement of secure information flow in computational systems such as computer programs. An important aspect of the problem of secure information flow is the development of policies by which we can express intended information release
APA, Harvard, Vancouver, ISO, and other styles
16

Myers, Andrew C. (Andrew Clifford). "Mostly-static decentralized information flow control." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/16717.

Full text
Abstract:
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1999.<br>Includes bibliographical references (p. 169-174) and index.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>The growing use of mobile code in downloaded programs such as applets and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Common security mechanisms such as sand boxing and access control are either too restrictive or too weak --
APA, Harvard, Vancouver, ISO, and other styles
17

Cheng, Winnie Wing-Yee. "Information flow for secure distributed applications." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/55095.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 171-177).<br>Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage enterprise reputations, and cost billion of dollars. While distributed computing architectures provide data and service integration, they also create information flow con
APA, Harvard, Vancouver, ISO, and other styles
18

Christian, Andrew D. (Andrew Dean). "Simulation of information flow in design." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/11102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Schultz, David Andrew. "Decentralized information flow control for databases." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/78363.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (p. 177-194).<br>Privacy and integrity concerns have been mounting in recent years as sensitive data such as medical records, social network records, and corporate and government secrets are increasingly being stored in online systems.
APA, Harvard, Vancouver, ISO, and other styles
20

Zanioli, Matteo. "Information flow analysis by abstract interpretation." Paris 7, 2012. http://www.theses.fr/2012PA077262.

Full text
Abstract:
Protéger la confidentialité de l’information numérique stockée ou en transfert sur des réseaux publics est un problème récurrent dans le domaine de la sécurité informatique. Le but de cette thèse est de fournir des résultats théoriques et expérimentaux sur une analyse de flux permettant la vérification automatique de l’absence de fuite possible d’information sensible. Notre approche est basée sur la théorie de l’Interprétation Abstraite et consiste à manipuler une approximation de la sémantique des programmes. Nous détectons les différentes dépendances entre les variables d’un programme en uti
APA, Harvard, Vancouver, ISO, and other styles
21

Lundqvist, Magnus. "Information Demand and Use : Improving Information Flow within Small-scale Business Contexts." Licentiate thesis, Linköping : Department of Computer and Information Science, Linköpings universitet, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Espinoza, Becerra Barbara. "Foundations of Quantitative Information Flow: Channels, Cascades, and the Information Order." FIU Digital Commons, 2014. http://digitalcommons.fiu.edu/etd/1156.

Full text
Abstract:
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret information. For this reason, the past decade has seen growing interest in quantitative theories of information flow that allow us to quantify the information being leaked. Within these theories, the system is modeled as an information-theoretic channel that specifies the probability of each output, given each input. Given a prior distribution on those inputs, entropy-like measures quantify the amount of information leakage caused by the channel. This thesis presents new results in the theory o
APA, Harvard, Vancouver, ISO, and other styles
23

Law, Yan Tai. "Pricing under random information flow and the theory of information pricing." Thesis, Imperial College London, 2012. http://hdl.handle.net/10044/1/9292.

Full text
Abstract:
This thesis presents a mathematical formulation of informational inhomogeneity in financial markets, with emphasis on its impact on asset volatility, the notion of information extraction, and the role of information providers. We begin with a brief review of the BHM framework, which models the market filtration by an information process consisting of a signal and a noise term, such that the signal-to-noise ratio is determined by the information flow rate. Motivated by the observations that valuable information is rarely circulated homogeneously across financial markets, and that the informatio
APA, Harvard, Vancouver, ISO, and other styles
24

Le, Guernic Gurvan. "Confidentiality Enforcement Using Dynamic Information Flow Analyses." Phd thesis, Kansas State University, 2007. http://tel.archives-ouvertes.fr/tel-00198621.

Full text
Abstract:
Avec l'augmentation des communications entre systèmes d'information, l'intérêt pour les mécanismes de sécurité s'est accru. La notion de non-interférence, introduite par Goguen and Meseguer (1982), est fréquemment utilisée pour formaliser des politiques de sécurité impliquant la confidentialité des secrets manipulés par un programme. Un programme est dit non-interférant si son comportement observable par tous n'est pas influencé par la valeur des secrets qu'il manipule. Si ce n'est pas le cas, alors un attaquant ayant connaissance du code source du programme peut déduire des information concer
APA, Harvard, Vancouver, ISO, and other styles
25

Zvirblis, Linas. "Securing Information Flow in Loosely-Coupled Systems." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-14086.

Full text
Abstract:
Information-flow control is an important element in computer system security, and there has been significant work done in the field by Denning, Volpano, and others. However, most of the work deals with information-flow control inside a single monolithic application. Wide adoption of the Web service architecture and related technologies effectively solved the problem of universal standard of interconnection of independent systems into larger scale system, but largely ignored the problem of information-flow control. This thesis suggests an approach, which allows for information-flow control tech
APA, Harvard, Vancouver, ISO, and other styles
26

Deng, Zhenyue. "Practical secure information flow in programming languages." FIU Digital Commons, 2005. http://digitalcommons.fiu.edu/etd/2771.

Full text
Abstract:
If we classify variables in a program into various security levels, then a secure information flow analysis aims to verify statically that information in a program can flow only in ways consistent with the specified security levels. One well-studied approach is to formulate the rules of the secure information flow analysis as a type system. A major trend of recent research focuses on how to accommodate various sophisticated modern language features. However, this approach often leads to overly complicated and restrictive type systems, . making them unfit for practical use. Also, problems essen
APA, Harvard, Vancouver, ISO, and other styles
27

Zhang, Chenyi Computer Science &amp Engineering Faculty of Engineering UNSW. "Information flow security - models, verification and schedulers." Publisher:University of New South Wales. Computer Science & Engineering, 2009. http://handle.unsw.edu.au/1959.4/43410.

Full text
Abstract:
Information flow security concerns how to protect sensitive data in computer systems by avoiding undesirable flow of information between the users of the systems. This thesis studies information flow security properties in state-based systems, dealing in particular with modelling and verification methods for asynchronous systems and synchronous systems with schedulers. The aim of this study is to provide a foundational guide to ensure confidentiality in system design and verification. The thesis begins with a study of definitions of security properties in asynchronous models. Two classes of s
APA, Harvard, Vancouver, ISO, and other styles
28

George, Ryan Thomas. "Information flow to support front end planning." Connect to this title online, 2007. http://etd.lib.clemson.edu/documents/1181666151/.

Full text
Abstract:
Thesis (Ph.D.) -- Clemson University, 2007.<br>Title from first page of PDF file. Document formatted into pages; contains xvi, 385 p. ; also includes graphics (some col.). Contains additional supplemental file.
APA, Harvard, Vancouver, ISO, and other styles
29

Akuney, Arseniy. "Information flow identification in large email datasets." Thesis, University of British Columbia, 2011. http://hdl.handle.net/2429/39847.

Full text
Abstract:
Identifying information flow in emails is an important, yet challenging task. In this work we investigate several algorithms for identifying similar sentences in large email datasets, as well as an algorithm for reconstructing threads from unstructured emails. We present a detailed evaluation of each algorithm in terms of accuracy and time performance. We also investigate the usage of cloud computing in order to increase computational efficiency and make information discovery usable in real time.
APA, Harvard, Vancouver, ISO, and other styles
30

Lundqvist, Pia. "A service minded information flow in transports." Thesis, Linköpings universitet, Institutionen för teknik och naturvetenskap, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96197.

Full text
Abstract:
This thesis is about information flow and customer service at Besam Production AB´s transport department. The focus of this thesis is to study the daily routines at the transport department regarding information flow and customer service both to the customers and to the forwarder. And how the information flow can be changed to be more efficient, save time and how to make this to an advantage against theirs competitors, is also studied. Like vise the customer service that Besam Production today is offering their customer at the transportation point and witch improvements that can be carried out
APA, Harvard, Vancouver, ISO, and other styles
31

Ahmedani, Ahmer. "Information flow in a Java intermediate language." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=100756.

Full text
Abstract:
It is a common practice to retrieve code from an outside source, execute it and return the result to the user. During execution secure data can enter the program by user input or access of a data resource. It is important to track the secure data once it enters the program to identify possible information flows to unwanted regions of the code which would permit undesirable data output to a user. Most approaches to restrict information flow in programs have fallen short of providing a practical solution for mainstream programming languages.<br>To address this issue, this thesis presents two con
APA, Harvard, Vancouver, ISO, and other styles
32

Chung, William Wing-Ho. "Secure information flow in object oriented languages." Thesis, Imperial College London, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.408806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Zhang, Kan. "On secure information flow in computer systems." Thesis, University of Cambridge, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621829.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Razavi, Joseph. "Information flow in spatial models of computation." Thesis, University of Manchester, 2017. https://www.research.manchester.ac.uk/portal/en/theses/information-flow-in-spatial-models-of-computation(cbd06463-5662-44cd-abe5-5cbc7370d41d).html.

Full text
Abstract:
Some models of computation have a notion of underlying space. In this thesis, we study the way in which information flows over this space in the course of computation, with the aim of discovering some geometric structure in the set of possible computations. We select cellular automata as a particular example to study. We define an abstract notion of information flow and characterize those which come from cellular automata. A slight generalization of the properties involved in the characterization includes what can be interpreted as a continuity condition on the flow of information. This condit
APA, Harvard, Vancouver, ISO, and other styles
35

McCamant, Stephen. "Quantitative information-flow tracking for real systems." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/44903.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Includes bibliographical references (p. 99-105).<br>An information-flow security policy constrains a computer system's end-to-end use of information, even as it is transformed in computation. For instance, a policy would not just restrict what secret data could be revealed directly, but restrict any output that might allow infere
APA, Harvard, Vancouver, ISO, and other styles
36

Krohn, Maxwell N. (Maxwell Norman). "Information flow control for secure web sites." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/45864.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008.<br>Includes bibliographical references (leaves 117-125).<br>Sometimes Web sites fail in the worst ways. They can reveal private data that can never be retracted [60, 72, 78, 79]. Or they can succumb to vandalism, and subsequently show corrupt data to users [27]. Blame can fall on the off-the-shelf software that runs the site (e.g., the operating system, the application libraries, the Web server, etc.), but more frequently (as in the above references), the custom application code
APA, Harvard, Vancouver, ISO, and other styles
37

Texin, Cheryl (Cheryl A. ). "Optical flow using phase information for deblurring." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41673.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.<br>Includes bibliographical references (p. 121-123).<br>This thesis presents a method for reconstructing motion-degraded images by using velocity information generated with a phase-based optical flow calculation. The optical flow method applies a set of frequency-tuned Gabor filters to an image sequence in order to determine the component velocities for each pixel by tracking temporally separated phase contours. The resulting set of component velocities is normalized and average
APA, Harvard, Vancouver, ISO, and other styles
38

Cliffer, Natan Tsvi Cohen. "Decentralized information flow control on a cluster." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/45985.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.<br>Includes bibliographical references (p. 53-54).<br>Information flow control security models can prevent programs from divulging sensitive information in unexpected ways. There has been significant work on tracking information flow between processes in the same computer at the operating system level. I present a modification to the Flume information flow control system for OpenBSD that allows information flow to be tracked between programs on different computers, as long as th
APA, Harvard, Vancouver, ISO, and other styles
39

Mathewson, Nicholas A. (Nicholas Albert) 1977. "Verifying information flow control in Java bytecodes." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86523.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.<br>Includes bibliographical references (p. 49).<br>by Nicholas A. Mathewson.<br>M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
40

Roberts, Benjamin George. "Language semantics for secure information flow analysis." Thesis, University of Cambridge, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.607941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Sarrab, Mohamed Khalefa. "Policy based runtime verification of information flow." Thesis, De Montfort University, 2011. http://hdl.handle.net/2086/4929.

Full text
Abstract:
Standard security mechanism such as Access control, Firewall and Encryption only focus on controlling the release of information but no limitations are placed on controlling the propagation of that confidential information. The principle problem of controlling sensitive information confidentiality starts after access is granted. The research described in this thesis belongs to the constructive research field where the constructive refers to knowledge contributions being developed as a new framework, theory, model or algorithm. The methodology of the proposed approach is made up of eight work p
APA, Harvard, Vancouver, ISO, and other styles
42

Dash, Santanu Kumar. "Adaptive constraint solving for information flow analysis." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/16354.

Full text
Abstract:
In program analysis, unknown properties for terms are typically represented symbolically as variables. Bound constraints on these variables can then specify multiple optimisation goals for computer programs and nd application in areas such as type theory, security, alias analysis and resource reasoning. Resolution of bound constraints is a problem steeped in graph theory; interdependencies between the variables is represented as a constraint graph. Additionally, constants are introduced into the system as concrete bounds over these variables and constants themselves are ordered over a lattice
APA, Harvard, Vancouver, ISO, and other styles
43

Akella, Ravi Chandra. "Information flow properties for cyber-physical systems." Diss., Rolla, Mo. : Missouri University of Science and Technology, 2009. http://scholarsmine.mst.edu/thesis/pdf/Akella_09007dcc806406a3.pdf.

Full text
Abstract:
Thesis (M.S.)--Missouri University of Science and Technology, 2009.<br>Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 15, 2009) Includes bibliographical references (p. 34-36).
APA, Harvard, Vancouver, ISO, and other styles
44

Frazza, Alessandro <1988&gt. "An Information Flow Type System for Android." Master's Degree Thesis, Università Ca' Foscari Venezia, 2013. http://hdl.handle.net/10579/2839.

Full text
Abstract:
La crescente adozione da parte di dispositivi mobili del sistema operativo Android ha accresciuto l'interesse in meccanismi capaci di garantire la segretezza e l'integrità delle informazioni sensibili presenti all'interno dei dispositivi stessi. Questa tesi descrive un nuovo type system che, sfruttando il Decentralized Label Model, permette allo sviluppatore di garantire il rispetto delle suddette proprietà da parte del proprio applicativo, in maniera del tutto trasparente per l'utente finale. Il framework proposto deve affrontare alcune sfide peculiari della piattaforma Android, quali un cont
APA, Harvard, Vancouver, ISO, and other styles
45

Mahnke, Rolf [Verfasser]. "Flow Experience on the Internet : Advances in Information Systems Flow Research / Rolf Mahnke." Berlin : epubli GmbH, 2015. http://d-nb.info/1070122920/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Mäkinen, J. M. (Juha-Matti). "Flow-tila elektronisten laitteiden käytössä." Master's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201710112982.

Full text
Abstract:
Flow-tila on mielentila, jossa henkilö on uppoutunut suorittamaansa aktiviteettiin energisellä tavalla. Sen ominaisuuksiin kuuluvat erityisesti syventyminen ja nautinnollisuus. Flow-tilan huomaa mm. siitä, että henkilö on kokonaan syventynyt aktiviteettiinsa ja menettänyt ajantajunsa. Tutkimuksen tarkoituksena oli tutkia erityisesti flow-tilan vaikutuksia elektronisten laitteiden käytössä, ja miten flow-tila koetaan yksilöllisellä tasolla elektronisten laitteiden kanssa työskenneltäessä. Aluksi tehtiin katsaus aikaisemmista flow-tiloja käsittelevistä tutkimuksista. Katsauksen pohjalta valittii
APA, Harvard, Vancouver, ISO, and other styles
47

Khademhosseinieh, Banafsheh, and Muhammad Tahir Khan. "Tools and Organisational Measures to Improve Information Flow." Thesis, Jönköping University, JTH, Computer and Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-9608.

Full text
Abstract:
<p>In this age, too much information is provided to the users. So that they face information overload problem and spend more time in finding the right information according to their needs. The information available to the right person on the right time can make significant difference in the work tasks and business processes in an organisation.</p><p>This thesis work is on improving information flow within an organisation for a person having a certain role. The concentration of the work is on finding the factors (Qualifiers) which affect the information needs of the user and the actions which s
APA, Harvard, Vancouver, ISO, and other styles
48

Gatenby, Robert A., and B. Roy Frieden. "Cellular information dynamics through transmembrane flow of ions." NATURE PUBLISHING GROUP, 2017. http://hdl.handle.net/10150/626193.

Full text
Abstract:
We propose cells generate large transmembrane ion gradients to form information circuits that detect, process, and respond to environmental perturbations or signals. In this model, the specialized gates of transmembrane ion channels function as information detectors that communicate to the cell through rapid and (usually) local pulses of ions. Information in the ion "puffs" is received and processed by the cell through resulting changes in charge density and/or mobile cation (and/or anion) concentrations alter the localization and function of peripheral membrane proteins. The subsequent change
APA, Harvard, Vancouver, ISO, and other styles
49

Meng, Ziyuan. "Two-Bit Pattern Analysis For Quantitative Information Flow." FIU Digital Commons, 2014. http://digitalcommons.fiu.edu/etd/1326.

Full text
Abstract:
Protecting confidential information from improper disclosure is a fundamental security goal. While encryption and access control are important tools for ensuring confidentiality, they cannot prevent an authorized system from leaking confidential information to its publicly observable outputs, whether inadvertently or maliciously. Hence, secure information flow aims to provide end-to-end control of information flow. Unfortunately, the traditionally-adopted policy of noninterference, which forbids all improper leakage, is often too restrictive. Theories of quantitative information flow address t
APA, Harvard, Vancouver, ISO, and other styles
50

Corns, Steven Michael. "The role of information flow in engineering optimization." [Ames, Iowa : Iowa State University], 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!