147,05 €
163,39 €
-10% with code: EXTRA
Expressing Information Flow Properties
Expressing Information Flow Properties
147,05
163,39 €
  • We will send in 10–14 business days.
With information comes responsibility: a responsibility to use information according to appropriate restrictions. Forced by regulations and public sentiment, technology companies are increasing the transparency of how personal data is used, allowing users to make more fine-grained decisions on how and where their information should flow. Work over the last four decades has led to the term Information flow properties being introduced. These can express complex restrictions on data usage by speci…
163.39
  • Publisher:
  • Year: 2022
  • Pages: 120
  • ISBN-10: 1680839365
  • ISBN-13: 9781680839364
  • Format: 15.6 x 23.4 x 0.6 cm, minkšti viršeliai
  • Language: English
  • SAVE -10% with code: EXTRA

Expressing Information Flow Properties (e-book) (used book) | bookbook.eu

Reviews

Description

With information comes responsibility: a responsibility to use information according to appropriate restrictions. Forced by regulations and public sentiment, technology companies are increasing the transparency of how personal data is used, allowing users to make more fine-grained decisions on how and where their information should flow. Work over the last four decades has led to the term Information flow properties being introduced. These can express complex restrictions on data usage by specifying how sensitive data may flow throughout computation. In this monograph the authors match the demand of the digital society for expressing complex data-usage restrictions with the supply of information flow properties proposed in the literature. For the first time ever, the authors perform a large-scale systematization of such information flow properties. In doing so, they survey the wide variety of information flow properties that have been formulated within the last four decades, compare their expressive power, and suggest research directions for a faster convergence between future technological demand and literature supply. This concise overview of such a diverse topic provides the reader with an invaluable reference when implementing security technologies into all types of information systems. It is particularly useful for students, researchers and practitioners working on modern day information security problems.

EXTRA 10 % discount with code: EXTRA

147,05
163,39 €
We will send in 10–14 business days.

The promotion ends in 23d.21:18:09

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,63 Book Euros!?
  • Author: Elisavet Kozyri
  • Publisher:
  • Year: 2022
  • Pages: 120
  • ISBN-10: 1680839365
  • ISBN-13: 9781680839364
  • Format: 15.6 x 23.4 x 0.6 cm, minkšti viršeliai
  • Language: English English

With information comes responsibility: a responsibility to use information according to appropriate restrictions. Forced by regulations and public sentiment, technology companies are increasing the transparency of how personal data is used, allowing users to make more fine-grained decisions on how and where their information should flow. Work over the last four decades has led to the term Information flow properties being introduced. These can express complex restrictions on data usage by specifying how sensitive data may flow throughout computation. In this monograph the authors match the demand of the digital society for expressing complex data-usage restrictions with the supply of information flow properties proposed in the literature. For the first time ever, the authors perform a large-scale systematization of such information flow properties. In doing so, they survey the wide variety of information flow properties that have been formulated within the last four decades, compare their expressive power, and suggest research directions for a faster convergence between future technological demand and literature supply. This concise overview of such a diverse topic provides the reader with an invaluable reference when implementing security technologies into all types of information systems. It is particularly useful for students, researchers and practitioners working on modern day information security problems.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)