An Alternative Approach to Confidentiality Analysis

Zi Xiaochao,Yao Lihong,Pan Li
DOI: https://doi.org/10.1109/ICCIAS.2006.295325
2007-01-01
Abstract:Access control mechanisms can't efficiently restrict hidden information flow, and confidential information can stealthily leak out with hidden information flow. We outline a state-based approach to analyzing hidden information flow. The main idea of the approach is to model secure systems as finite automata, and analyze the properties of information flow by studying the characteristic of the finite automata
What problem does this paper attempt to address?