Compiling Information-Flow Security to Minimal Trusted Computing Bases.
Cédric FournetJérémy PlanulPublished in: ESOP (2011)
Keyphrases
- information flow
- trusted computing
- information security
- computer security
- computing platform
- computing environments
- remote attestation
- trusted platform module
- flow analysis
- information flows
- access control policies
- social networks
- virtual organization
- cloud computing
- communication networks
- supply chain
- flow graph
- access control
- network security
- information systems
- databases
- intrusion detection
- case study
- data warehouse
- smart card