메뉴 건너뛰기




Volumn , Issue , 2013, Pages 89-99

Information flow control for stream processing in clouds

Author keywords

Chinese Wall Policy; Clouds; Data Streams; Information Flow

Indexed keywords

CHINESE WALL POLICIES; DATA STREAM; EMERGENCY CONTROL; HEALTH MONITORING; INFORMATION FLOW CONTROL; INFORMATION FLOWS; SITUATIONAL MONITORING; STREAM PROCESSING;

EID: 84883115366     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2462410.2463205     Document Type: Conference Paper
Times cited : (21)

References (26)
  • 3
    • 33746364223 scopus 로고    scopus 로고
    • SnoopIB: Interval-based event specification and detection for active databases
    • R. Adaikkalavan and S. Chakravarthy. SnoopIB: Interval-based Event Specification and Detection for Active Databases. DKE, 59(1):139-165, 2006.
    • (2006) DKE , vol.59 , Issue.1 , pp. 139-165
    • Adaikkalavan, R.1    Chakravarthy, S.2
  • 5
    • 79960246725 scopus 로고    scopus 로고
    • Multilevel secure data stream processing
    • R. Adaikkalavan, I. Ray, and X. Xie. Multilevel Secure Data Stream Processing. In Proc. of the DBSec, pages 122-137, 2011.
    • (2011) Proc. of the DBSec , pp. 122-137
    • Adaikkalavan, R.1    Ray, I.2    Xie, X.3
  • 7
    • 33745289988 scopus 로고    scopus 로고
    • The CQL continuous query language: Semantic foundations and query execution
    • A. Arasu, S. Babu, and J. Widom. The CQL Continuous Query Language: Semantic Foundations and Query Execution. VLDB Journal, 15(2):121-142, 2006.
    • (2006) VLDB Journal , vol.15 , Issue.2 , pp. 121-142
    • Arasu, A.1    Babu, S.2    Widom, J.3
  • 10
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and MULTICS interpretation
    • rev. 1, The MITRE Corporation, Bedford, MA 01730
    • D. E. Bell and L. J. LaPadula. Secure Computer System: Unified Exposition and MULTICS Interpretation. Technical Report MTR-2997 Rev. 1 and ESD-TR-75-306, rev. 1, The MITRE Corporation, Bedford, MA 01730, 1976.
    • (1976) Technical Report MTR-2997 Rev. 1 and ESD-TR-75-306
    • Bell, D.E.1    LaPadula, L.J.2
  • 12
    • 67649659827 scopus 로고    scopus 로고
    • ACStream: Enforcing access control over data streams
    • J. Cao, B. Carminati, E. Ferrari, and K. Tan. ACStream: Enforcing Access Control over Data Streams. In Proc. of the ICDE, pages 1495-1498, 2009.
    • (2009) Proc. of the ICDE , pp. 1495-1498
    • Cao, J.1    Carminati, B.2    Ferrari, E.3    Tan, K.4
  • 15
    • 57549083455 scopus 로고    scopus 로고
    • Event and streams: Harnessing and unleashing their synergy
    • S. Chakravarthy and R. Adaikkalavan. Event and Streams: Harnessing and Unleashing Their Synergy. In Proc. of the DEBS, pages 1-12, 2008.
    • (2008) Proc. of the DEBS , pp. 1-12
    • Chakravarthy, S.1    Adaikkalavan, R.2
  • 16
    • 78651429569 scopus 로고    scopus 로고
    • Stream data processing: A quality of service perspective modeling, scheduling, load shedding, and complex event processing
    • Springer
    • S. Chakravarthy and Q. Jiang. Stream Data Processing: A Quality of Service Perspective Modeling, Scheduling, Load Shedding, and Complex Event Processing. Advances in Database Systems, Vol. 36. Springer, 2009.
    • (2009) Advances in Database Systems , vol.36
    • Chakravarthy, S.1    Jiang, Q.2
  • 18
    • 34548023942 scopus 로고    scopus 로고
    • Managing the risk of covert information flows in virtual machine systems
    • T. Jaeger, R. Sailer, and Y. Sreenivasan. Managing the Risk of Covert Information Flows in Virtual Machine Systems. In Proc. of the ACM SACMAT, pages 81-90, 2007.
    • (2007) Proc. of the ACM SACMAT , pp. 81-90
    • Jaeger, T.1    Sailer, R.2    Sreenivasan, Y.3
  • 20
    • 34548019652 scopus 로고    scopus 로고
    • Securing the borealis data stream engine
    • W. Lindner and J. Meier. Securing the Borealis Data Stream Engine. In IDEAS, pages 137-147, 2006.
    • (2006) IDEAS , pp. 137-147
    • Lindner, W.1    Meier, J.2
  • 21
    • 70849105916 scopus 로고    scopus 로고
    • StreamShield: A stream-centric approach towards security and privacy in data stream environments
    • R. V. Nehme, H. Lim, E. Bertino, and E. A. Rundensteiner. StreamShield: A Stream-Centric Approach towards Security and Privacy in Data Stream Environments. In Proc. of the ACM SIGMOD, pages 1027-1030, 2009.
    • (2009) Proc. of the ACM SIGMOD , pp. 1027-1030
    • Nehme, R.V.1    Lim, H.2    Bertino, E.3    Rundensteiner, E.A.4
  • 22
    • 52649140439 scopus 로고    scopus 로고
    • A security punctuation framework for enforcing access control on streaming data
    • R. V. Nehme, E. A. Rundensteiner, and E. Bertino. A Security Punctuation Framework for Enforcing Access Control on Streaming Data. In Proc. of the ICDE, pages 406-415, 2008.
    • (2008) Proc. of the ICDE , pp. 406-415
    • Nehme, R.V.1    Rundensteiner, E.A.2    Bertino, E.3
  • 23
    • 0012551338 scopus 로고
    • Lattice-based enforcement of Chinese walls
    • R. Sandhu. Lattice-Based Enforcement of Chinese Walls. Computers & Security, 11(8):753-763, 1992.
    • (1992) Computers & Security , vol.11 , Issue.8 , pp. 753-763
    • Sandhu, R.1
  • 24
  • 26
    • 84866774406 scopus 로고    scopus 로고
    • A tiered strategy for auditing in the cloud
    • June
    • R. Xie and R. Gamble. A Tiered Strategy for Auditing in the Cloud. In Proc. of IEEE CLOUD, June 2012.
    • (2012) Proc. of IEEE CLOUD
    • Xie, R.1    Gamble, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.