Information flow in nondeterministic systems
- 1 January 1990
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 144-161
- https://doi.org/10.1109/risp.1990.63846
Abstract
An analysis of some recent combinatorial theories of computer security is presented from the perspective of information theory. The theories analyzed are information-flow theories based on the concept of nondeducibility. They are intended to be applicable to nondeterministic systems that may be networked.Keywords
This publication has 6 references indexed in Scilit:
- Foundations of Ulysses: The Theory of SecurityPublished by Defense Technical Information Center (DTIC) ,1988
- Covert Channel CapacityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Unwinding and Inference ControlPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1984
- Security Policies and Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Secure Computer System: Unified Exposition and Multics InterpretationPublished by Defense Technical Information Center (DTIC) ,1976
- Coding Theorems of Information TheoryPublished by Springer Nature ,1964