By Topic

An Information Flow Security Model to Trusted Computing System

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Hu Jun ; Graduate Sch. of Chinese Acadamy of Sci., Beijing ; Shen Changxiang

In this paper, we introduce a new information flow model for trusted computing systems.Different from traditional system protection models, such as access control matrix model, this model analyze the information flow in the system by tracing the operation sequences , and explains that the security status of a trusted computing system is the security attributes of information flows from input port to output port.With this model, we discuss the information channels in a trusted computing systems, and propose a "normal information flow theorem" which gives a necessary condition of the existence of normal information flow.

Published in:

Data, Privacy, and E-Commerce, 2007. ISDPE 2007. The First International Symposium on

Date of Conference:

1-3 Nov. 2007