Abstract
This paper presents Strong Dependency, a formalism based on an information theoretic approach to information transmission in computational systems. Using the formalism, we show how the imposition of initial constraints reduces variety in a system, eliminating undesirable information paths. In this way, protection problems, such as the Confinement Problem, may be solved. A variety of inductive techniques are developed useful for proving that such solutions are correct.
Publisher
Association for Computing Machinery (ACM)
Reference11 articles.
1. W. Ashby. "An Introduction to Cybernetics" 1956. W. Ashby. "An Introduction to Cybernetics" 1956.
2. Protection in the Hydra Operating System
3. D. Denning "Secure Information Flow in Computer Systems" Ph.D. Thesis Comp. Sci. Dept. Purdue Univ. May 1975. D. Denning "Secure Information Flow in Computer Systems" Ph.D. Thesis Comp. Sci. Dept. Purdue Univ. May 1975.
4. A lattice model of secure information flow
Cited by
67 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献