Logic and Information Flow

Logic and Information Flow PDF

Author: Jan Eijck

Publisher: MIT Press

Published: 1994

Total Pages: 256

ISBN-13: 9780262220477

DOWNLOAD EBOOK →

The logic of information flow has applications in both computer science and natural language processing and is a growing area within mathematical and philosophical logic.

The Science of Quantitative Information Flow

The Science of Quantitative Information Flow PDF

Author: Mário S. Alvim

Publisher: Springer Nature

Published: 2020-09-23

Total Pages: 478

ISBN-13: 3319961314

DOWNLOAD EBOOK →

This book presents a comprehensive mathematical theory that explains precisely what information flow is, how it can be assessed quantitatively – so bringing precise meaning to the intuition that certain information leaks are small enough to be tolerated – and how systems can be constructed that achieve rigorous, quantitative information-flow guarantees in those terms. It addresses the fundamental challenge that functional and practical requirements frequently conflict with the goal of preserving confidentiality, making perfect security unattainable. Topics include: a systematic presentation of how unwanted information flow, i.e., "leaks", can be quantified in operationally significant ways and then bounded, both with respect to estimated benefit for an attacking adversary and by comparisons between alternative implementations; a detailed study of capacity, refinement, and Dalenius leakage, supporting robust leakage assessments; a unification of information-theoretic channels and information-leaking sequential programs within the same framework; and a collection of case studies, showing how the theory can be applied to interesting realistic scenarios. The text is unified, self-contained and comprehensive, accessible to students and researchers with some knowledge of discrete probability and undergraduate mathematics, and contains exercises to facilitate its use as a course textbook.

Information Flow

Information Flow PDF

Author: Jon Barwise

Publisher: Cambridge University Press

Published: 1997-07-28

Total Pages: 294

ISBN-13: 9780521583862

DOWNLOAD EBOOK →

Information is a central topic in computer science, cognitive science and philosophy. Drawing on ideas from these subjects, this book addresses the definition and place of information in society.

An Introduction to Transfer Entropy

An Introduction to Transfer Entropy PDF

Author: Terry Bossomaier

Publisher: Springer

Published: 2016-11-15

Total Pages: 190

ISBN-13: 3319432222

DOWNLOAD EBOOK →

This book considers a relatively new metric in complex systems, transfer entropy, derived from a series of measurements, usually a time series. After a qualitative introduction and a chapter that explains the key ideas from statistics required to understand the text, the authors then present information theory and transfer entropy in depth. A key feature of the approach is the authors' work to show the relationship between information flow and complexity. The later chapters demonstrate information transfer in canonical systems, and applications, for example in neuroscience and in finance. The book will be of value to advanced undergraduate and graduate students and researchers in the areas of computer science, neuroscience, physics, and engineering.

Integration of Information Flow for Greening Supply Chain Management

Integration of Information Flow for Greening Supply Chain Management PDF

Author: Adam Kolinski

Publisher: Springer Nature

Published: 2019-08-21

Total Pages: 415

ISBN-13: 3030243559

DOWNLOAD EBOOK →

This book provides a framework for integrating information management in supply chains. Current trends in business practice have made it necessary to explore the potential held by information integration with regard to environmental aspects. Information flow integration provides an opportunity to focus on the creation of a more “green” supply chain. However, it is currently difficult to identify the impact of information integration on greening a supply chain in a wide range of practical applications. Accordingly, this book focuses on the potential value of information integration solutions in terms of greening supply chain management. It covers the following major topics: Application of information flow standards in the supply chain Information systems and technological solutions for integrating information flows in supply chains The Internet of Things and the industry 4.0 concept, with regard to the integration of supply chains Modeling and simulation of logistics processes Decision-making tools enabling the greening of supply chains

Systematic Approaches to Advanced Information Flow Analysis – and Applications to Software Security

Systematic Approaches to Advanced Information Flow Analysis – and Applications to Software Security PDF

Author: Mohr, Martin

Publisher: KIT Scientific Publishing

Published: 2023-06-14

Total Pages: 464

ISBN-13: 3731512750

DOWNLOAD EBOOK →

I report on applications of slicing and program dependence graphs (PDGs) to software security. Moreover, I propose a framework that generalizes both data-flow analysis on control-flow graphs and slicing on PDGs. This framework can be used to systematically derive data-flow-like analyses on PDGs that go beyond slicing. I demonstrate that data-flow analysis can be systematically applied to PDGs and show the practicability of my approach.

Information Flow Based Security Control Beyond RBAC

Information Flow Based Security Control Beyond RBAC PDF

Author: Klaus-Peter Fischer-Hellmann

Publisher: Springer Science & Business Media

Published: 2012-11-02

Total Pages: 178

ISBN-13: 3834826189

DOWNLOAD EBOOK →

Role-based access control (RBAC) is a widely used technology to control information flows as well as control flows within and between applications in compliance with restrictions implied by security policies, in particular, to prevent disclosure of information or access to resources beyond restrictions defined by those security policies. Since RBAC only provides the alternatives of either granting or denying access, more fine-grained control of information flows such as “granting access to information provided that it will not be disclosed to targets outside our organisation during further processing” is not possible. In business processes, in particular those spanning several organisations, which are commonly defined using business process execution language (BPEL), useful information flows not violating security policy-implied limitations would be prevented if only the access control capabilities offered by RBAC are in use. The book shows a way of providing more refined methods of information flow control that allow for granting access to information or resources by taking in consideration the former or further information flow in a business process requesting this access. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows that make use of Grid services or Cloud services. IT Security Specialists Chief Information Officers (CIOs) Chief Security Officers (CSOs) Security Policy and Quality Assurance Officers and Managers Business Process and Web/Grid/Cloud Service Designers, Developers, Operational Managers Interested Learners / Students in the Field of Security Management.

Expressing Information Flow Properties

Expressing Information Flow Properties PDF

Author: Elisavet Kozyri

Publisher:

Published: 2022-01-19

Total Pages: 120

ISBN-13: 9781680839364

DOWNLOAD EBOOK →

With information comes responsibility: a responsibility to use information according to appropriate restrictions. Forced by regulations and public sentiment, technology companies are increasing the transparency of how personal data is used, allowing users to make more fine-grained decisions on how and where their information should flow. Work over the last four decades has led to the term Information flow properties being introduced. These can express complex restrictions on data usage by specifying how sensitive data may flow throughout computation. In this monograph the authors match the demand of the digital society for expressing complex data-usage restrictions with the supply of information flow properties proposed in the literature. For the first time ever, the authors perform a large-scale systematization of such information flow properties. In doing so, they survey the wide variety of information flow properties that have been formulated within the last four decades, compare their expressive power, and suggest research directions for a faster convergence between future technological demand and literature supply. This concise overview of such a diverse topic provides the reader with an invaluable reference when implementing security technologies into all types of information systems. It is particularly useful for students, researchers and practitioners working on modern day information security problems.