Dilewaer Doulikun

Learn More
In information systems, data in an object may illegally flow into another object if transactions manipulate the objects. In our previous studies, the role-based synchronization (RBS) and object-based synchronization (OBS) protocols are discussed to present illegal information flow in the role-based access control (RBAC) model. Illegal read operations mean(More)
In information systems, data in an object may illegally flow into another object if transactions read and write the objects. A transaction illegally reads an object if data in objects which the transaction is not allowed to read are stored in the object. In addition, it is specified data in which object is allowed to flow to other objects. A suspicious(More)
  • 1