Presentation | 2009-06-05 Web Push proposal upon the information flow control : Implementation of the filter information in the application server Akihito TODA, Hiroshi ICHISE, Kazuhiro SUZUKI, Tetsuya MORIZUMI, Hirotsugu KINOSHITA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Cloud is defined as follows; cloud is a pair of the meta-language and the address. Cloud is used to control covert channels. The system that concretely constructs it is RSS which is interpreted as push type Web. In addition, enhancing RSS that puts the Write function on RSS is defined, and, as a result, a dynamic collaboration is enabled. RSS corresponds to Cloud. The resources that Cloud directs are the files that exist in arbitrary directories in PC. Covert channels in Cloud are analyzed and controlled with the information filter. The information filter is an inference engine mounted by enhancing RSS system. As a result, it becomes possible to prevent the leak of information and the falsification from enhancing RSS. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | cloud / search index system / Security Model / Access Control / Covert Channel / information flow control |
Paper # | SITE2009-2 |
Date of Issue |
Conference Information | |
Committee | SITE |
---|---|
Conference Date | 2009/5/29(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Social Implications of Technology and Information Ethics (SITE) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Web Push proposal upon the information flow control : Implementation of the filter information in the application server |
Sub Title (in English) | |
Keyword(1) | cloud |
Keyword(2) | search index system |
Keyword(3) | Security Model |
Keyword(4) | Access Control |
Keyword(5) | Covert Channel |
Keyword(6) | information flow control |
1st Author's Name | Akihito TODA |
1st Author's Affiliation | Faculty of Engineering, Kanagawa University() |
2nd Author's Name | Hiroshi ICHISE |
2nd Author's Affiliation | UNITEX Co., Ltd. |
3rd Author's Name | Kazuhiro SUZUKI |
3rd Author's Affiliation | Faculty of Engineering, Kanagawa University |
4th Author's Name | Tetsuya MORIZUMI |
4th Author's Affiliation | Toyo Networks & System Integration Co., Ltd. |
5th Author's Name | Hirotsugu KINOSHITA |
5th Author's Affiliation | Faculty of Engineering, Kanagawa University |
Date | 2009-06-05 |
Paper # | SITE2009-2 |
Volume (vol) | vol.109 |
Number (no) | 74 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |