Runtime monitoring and controlling of Information flow.

Date

2010

Advisors

Journal Title

Journal ISSN

ISSN

1947-5500

DOI

Volume Title

Publisher

Type

Article

Peer reviewed

Abstract

Computer systems are monitored to check performance or verified to check the correctness of the software systems with respect to security properties such as integrity, availability and confidentiality. The more sensitive the information, such as credit card information, military information or personal medical information, being processed by the software, the more necessary and important it is to monitor and control the flow of sensitive information. Monitoring and controlling an untrusted program behavior to ensure information confidentiality during runtime in an environment where confidential information is present is often difficult and unnerving task for users. The issue is how users can monitor and control the flow of the confidential information at the runtime of untrusted programs. In this paper we present a novel runtime verification approach for monitoring and controlling information flow that supports user interaction with a running program.

Description

Keywords

information flow control, runtime monitoring, confidentiality, usability

Citation

Sarrab, M. and Janicke, H. (2010) Runtime monitoring and controlling of information flow. International Journal of Computer Science and Information Security (IJCSIS), 8 (9), pp. 37-45

Rights

Research Institute

Cyber Technology Institute (CTI)