Academic literature on the topic 'Information flow'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information flow.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information flow"

1

Mygal, Valeriy, and Galyna Mygal. "Problems of Digitized Information Flow Analysis: Cognitive Aspects." Information & Security: An International Journal 43, no. 2 (2019): 134–44. http://dx.doi.org/10.11610/isij.4312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gruska, Damas P. "Information Flow Testing." Fundamenta Informaticae 128, no. 1-2 (2013): 81–95. http://dx.doi.org/10.3233/fi-2013-934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ahlswede, R., Ning Cai, S. Y. R. Li, and R. W. Yeung. "Network information flow." IEEE Transactions on Information Theory 46, no. 4 (July 2000): 1204–16. http://dx.doi.org/10.1109/18.850663.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Carlowicz, Michael. "Flow of information." Eos, Transactions American Geophysical Union 77, no. 27 (July 2, 1996): 254. http://dx.doi.org/10.1029/eo077i027p00254-02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Godlee, F. "Global information flow." BMJ 321, no. 7264 (September 30, 2000): 776–77. http://dx.doi.org/10.1136/bmj.321.7264.776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Godlee, Fiona, Richard Horton, and Richard Smith. "Global information flow." Lancet 356, no. 9236 (September 2000): 1129–30. http://dx.doi.org/10.1016/s0140-6736(00)02752-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Beraia, M., and G. Beraia. "Energy/information dissipation and blood flow in human body." Cardiology Research and Reports 3, no. 2 (May 10, 2021): 01–08. http://dx.doi.org/10.31579/2692-9759/017.

Full text
Abstract:
The amount of work done to displace blood in systemic arteries and capillaries exceeds the work done by the left ventricle. Besides, at the heartbeat, electromagnetic energy dissipates from the heart to the whole human body. For the problem study, the dielectric spectroscopy method was used. Ringer’s, amino acid solution, and heparinized venous blood were affected by the external electromagnetic oscillations (100-65000Hz, 1-8MHz.) in 17 healthy individuals. Correlations were noted between the initial and induced signal forms/frequencies according to the impedance of the system. The electric impulse from the heart initiates an oscillating electric field around the charged cells/particles and an emerging repulsing electromagnetic force, based on the electroacoustic phenomena, promotes the blood flow, in addition to the pulse pressure from the myocardial contraction. Blood conduces mechanical, electromagnetic waves of different frequencies and transmits energy/information to implement the spontaneous chemical processes in the human body.
APA, Harvard, Vancouver, ISO, and other styles
8

McCamant, Stephen, and Michael D. Ernst. "Quantitative information flow as network flow capacity." ACM SIGPLAN Notices 43, no. 6 (May 30, 2008): 193–205. http://dx.doi.org/10.1145/1379022.1375606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hongladarom, Soraj. "Information Divide, Information Flow and Global Justice." International Review of Information Ethics 7 (September 1, 2007): 77–81. http://dx.doi.org/10.29173/irie8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hu, Wei, Armaiti Ardeshiricham, and Ryan Kastner. "Hardware Information Flow Tracking." ACM Computing Surveys 54, no. 4 (May 2021): 1–39. http://dx.doi.org/10.1145/3447867.

Full text
Abstract:
Information flow tracking (IFT) is a fundamental computer security technique used to understand how information moves through a computing system. Hardware IFT techniques specifically target security vulnerabilities related to the design, verification, testing, manufacturing, and deployment of hardware circuits. Hardware IFT can detect unintentional design flaws, malicious circuit modifications, timing side channels, access control violations, and other insecure hardware behaviors. This article surveys the area of hardware IFT. We start with a discussion on the basics of IFT, whose foundations were introduced by Denning in the 1970s. Building upon this, we develop a taxonomy for hardware IFT. We use this to classify and differentiate hardware IFT tools and techniques. Finally, we discuss the challenges yet to be resolved. The survey shows that hardware IFT provides a powerful technique for identifying hardware security vulnerabilities, as well as verifying and enforcing hardware security properties.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Information flow"

1

Heusser, Jonathan. "Automating quantitative information flow." Thesis, Queen Mary, University of London, 2011. http://qmro.qmul.ac.uk/xmlui/handle/123456789/1260.

Full text
Abstract:
Unprecedented quantities of personal and business data are collected, stored, shared, and processed by countless institutions all over the world. Prominent examples include sharing personal data on social networking sites, storing credit card details in every store, tracking customer preferences of supermarket chains, and storing key personal data on biometric passports. Confidentiality issues naturally arise from this global data growth. There are continously reports about how private data is leaked from confidential sources where the implications of the leaks range from embarrassment to serious personal privacy and business damages. This dissertation addresses the problem of automatically quantifying the amount of leaked information in programs. It presents multiple program analysis techniques of different degrees of automation and scalability. The contributions of this thesis are two fold: a theoretical result and two different methods for inferring and checking quantitative information flows are presented. The theoretical result relates the amount of possible leakage under any probability distribution back to the order relation in Landauer and Redmond’s lattice of partitions [35]. The practical results are split in two analyses: a first analysis precisely infers the information leakage using SAT solving and model counting; a second analysis defines quantitative policies which are reduced to checking a k-safety problem. A novel feature allows reasoning independent of the secret space. The presented tools are applied to real, existing leakage vulnerabilities in operating system code. This has to be understood and weighted within the context of the information flow literature which suffers under an apparent lack of practical examples and applications. This thesis studies such “real leaks” which could influence future strategies for finding information leaks.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Xiang. "Efficiency in Emergency medical service system : An analysis on information flow." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1620.

Full text
Abstract:

In an information system which includes plenty of information services, we are always seeking a solution to enhance efficiency and reusability. Emergency medical service system is a classic information system using application integration in which the requirement of information flow transmissions is extremely necessary. We should always ensure this system is running in best condition with highest efficiency and reusability since the efficiency in the system directly affects human life.

The aim of this thesis is to analysis emergency medical system in both qualitative and quantitative ways. Another aim of this thesis is to suggest a method to judge the information flow through the analysis for the system efficiency and the correlations between information flow traffic and system applications.

The result is that system is a main platform integrated five information services. Each of them provides different unattached functions while they are all based on unified information resources. The system efficiency can be judged by a method called Performance Evaluation, the correlation can be judged by multi-factorial analysis of variance method.

APA, Harvard, Vancouver, ISO, and other styles
3

Aksakal, Baris. "Makeshift Information Constructions: Information Flow and Undercover Police." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4823/.

Full text
Abstract:
This dissertation presents the social virtual interface (SVI) model, which was born out of a need to develop a viable model of the complex interactions, information flow and information seeking behaviors among undercover officers. The SVI model was created from a combination of various philosophies and models in the literature of information seeking, communication and philosophy. The questions this research paper answers are as follows: 1. Can we make use of models and concepts familiar to or drawn from Information Science to construct a model of undercover police work that effectively represents the large number of entities and relationships? and 2. Will undercover police officers recognize this model as realistic? This study used a descriptive qualitative research method to examine the research questions. An online survey and hard copy survey were distributed to police officers who had worked in an undercover capacity. In addition groups of officers were interviewed about their opinion of the SVI model. The data gathered was analyzed and the model was validated by the results of the survey and interviews.
APA, Harvard, Vancouver, ISO, and other styles
4

Enescu, Mihai Adrian. "Precisely quantifying software information flow." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/57379.

Full text
Abstract:
A common attack point in a program is the input exposed to the user. The adversary crafts a malicious input that alters some internal state of the program, in order to acquire sensitive data, or gain control of the program's execution. One can say that the input exerts a degree of influence over specific program outputs. Although a low degree of influence does not guarantee the program's resistance to attacks, previous work has argued that a greater degree of influence tends to provide an adversary with an easier avenue of attack, indicating a potential security vulnerability. Quantitative information flow is a framework that has been used to detect a class of security flaws in programs, by measuring an attacker's influence. Programs may be considered as communication channels between program inputs and outputs, and information-theoretic definitions of information leakage may be used in order to measure the degree of influence which a program's inputs can have over its outputs, if the inputs are allowed to vary. Unfortunately, the precise information flow measured by this definition is difficult to compute, and prior work has sacrificed precision, scalability, and/or automation. In this thesis, I show how to compute this information flow (specifically, channel capacity) in a highly precise and automatic manner, and scale to much larger programs than previously possible. I present a tool, nsqflow, that is built on recent advances in symbolic execution and SAT solving. I use this tool to discover two previously-unknown buffer overflows. Experimentally, I demonstrate that this approach can scale to over 10K lines of real C code, including code that is typically difficult for program analysis tools to analyze, such as code using pointers.
Science, Faculty of
Computer Science, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
5

Zhu, Ping. "Quantifying information flow with constraints." Thesis, City University London, 2010. http://openaccess.city.ac.uk/12101/.

Full text
Abstract:
Quantifying flow of information in a program involves calculating how much information (e.g. about secret inputs) can be leaked by observing the program's public outputs. Recently this field has attracted a lot of research interest, most of which makes use of Shannon's information theory, e.g. mutual information, conditional entropy, etc. Computability entails that any automated analysis of information is necessarily incomplete. Thus quantitative flow of analyses aim to compute upper bounds on the sizes of the flows in a program. Virtually all the current quantitative analyses treat program variables independently, which significantly limits the potential for deriving tight upper bounds. Our work is motivated by the intuition that knowledge of the dependencies between program variables should allow the derivation of more precise upper bounds on the size of flows, and that classical abstract interpretation provides an effective mechanism for determining such dependencies in the form of linear constraints. Our approach is then to view the problem as one of constrained optimization (maximum entropy), allowing us to apply the standard technique of Lagrange multiplier method. Application of this technique turns out to require development of some novel methods due to the essential use of non-linear (entropy) constraints, in conjunction with the linear dependency constraints. Using these methods we obtain more precise upper bounds on the size of information flows than is possible with existing analysis techniques.
APA, Harvard, Vancouver, ISO, and other styles
6

Moses, John. "Cohesion prediction using information flow." Thesis, University of Sunderland, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.387492.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Payne, Joshua. "Interaction Topologies and Information Flow." ScholarWorks @ UVM, 2009. http://scholarworks.uvm.edu/graddis/177.

Full text
Abstract:
Networks are ubiquitous, underlying systems as diverse as the Internet, food webs, societal interactions, the cell, and the brain. Of crucial importance is the coupling of network structure with system dynamics, and much recent attention has focused on how information, such as pathogens, mutations, or ideas, ow through networks. In this dissertation, we advance the understanding of how network structure a ects information ow in two important classes of models. The rst is an independent interaction model, which is used to investigate the propagation of advantageous alleles in evolutionary algorithms. The second is a threshold model, which is used to study the dissemination of ideas, fads, and innovations throughout populations. This journal-format dissertation comprises three interrelated studies, in which we investigate the in uence of network structure on the dynamical properties of information ow. In the rst study, we develop an analytical technique to approximate system dynamics in arbitrarily structured regular interaction topologies. In the second study, we investigate the ow of advantageous alleles in degree-correlated scale-free population structures, and provide a simple topological metric for assessing the selective pressures induced by these networks. In the third study, we characterize the conditions in which global information cascades occur in threshold models of binary decisions with externalities, structured on degree-correlated Poisson-distributed random networks.
APA, Harvard, Vancouver, ISO, and other styles
8

Alhalalat, Saleh Ismail. "Information flow in virtual organisations." Thesis, Loughborough University, 2005. https://dspace.lboro.ac.uk/2134/7757.

Full text
Abstract:
The main aim of the study is to investigate the flows of information and the impact and added value of Information and Communication Technologies (ICTs) on the integration of information flows. This concept is related to the optimal design of organisational (and other) systems that allow the right decision to be made by the right person at the right time in an appropriate location. Clearly, information that is often distributed needs to come together in an efficient way to allow the best use of resources to maximize the information value. The virtual organisation (VO) is a new style of working that allows completion of tasks across time and location. The use of ICTs is viewed as a facilitator of these tasks and their application provides good examples to extend their use. The most common types of VOs are home offices, teleworking centres, mobile offices and `hotelling'. Teleworkers still face several problems, such as managing their work, lack of appropriate communications to complete their work efficiently, and isolation. This study applied an information-driven approach to investigate the current problems in the teleworking environment, and solutions are proposed to improve the flow of information in the VOs. The data required were collected by questionnaire survey, semi-structured interviews, and document analysis. Members of the Telework Association (TCA) in the UK were invited to take part in this survey, and 153 out of 800 respondents came from this source. From subsequent analysis of the data collected, there is indeed an issue with the use and integration of information flows in VOs. An in depth study of six individual cases revealed a lack of information sharing, poor understanding of information needs, and low rates of access to online information. Soft solutions can be achieved through understanding information needs, developing information policy, and training. Hard solutions can be achieved through using online information, using workflow software, upgrading the speed of Internet connection, using information sharing systems, and arranging more open access to information. Some indicators of future research can be mentioned, particularly in conducting the second generation of information audit in teleworking practice, to study knowledge management (KM) practices in teleworking, to develop information policies to enhance teleworking practices, to focus on the information needs of teleworkers, to evaluate the impact of software applications (such as workflow software), to implement information sharing systems, and to study the impact of training on information retrieval and use.
APA, Harvard, Vancouver, ISO, and other styles
9

Salvini, Fabio <1992&gt. "Flow logic based information flow analysis of Android applications." Master's Degree Thesis, Università Ca' Foscari Venezia, 2018. http://hdl.handle.net/10579/12996.

Full text
Abstract:
Android is the world's most popular mobile OS, with more than 2 billion monthly active devices. Static analysis is an essential tool to protect the sensitive data stored in the devices from malicious applications. In this thesis, we present the first flow logic for the information flow analysis of Dalvik bytecode that is specifically tailored to the peculiar lifecycle of Android applications. A prototype implementation based on a state-of-the-art SMT solver demonstrates the practicality of our approach.
APA, Harvard, Vancouver, ISO, and other styles
10

Bhatia, Shishir. "Structured Information Flow (SIF) Framework for Automating End-to-End Information Flow for Large Organizations." Thesis, Virginia Tech, 2006. http://hdl.handle.net/10919/31148.

Full text
Abstract:
For almost five decades, since the advent of the first computers for commercial use, the dream of the Paperless Office, a.k.a. total Information flow automation, has eluded the industry. Now, with the emergence of Internet- and Web-based technologies, daily we see examples of organizations like eBay and Amazon that perform their business in a fully automated manner without the use of paper or pen. However, bigger and older organizations that have more complex functions, like government organizations, have not been very successful in harnessing the latest technological innovations to completely automate their Information flow. We propose a Structured Information Flow (SIF) framework that provides the conceptual infrastructure to automate small and big, new and old organizations alike. The ease of the transformation is due to three key features of SIF that set it apart from any other Information flow automation scheme. First, SIF utilizes the attributes of the organization, such as the existing reporting structure, to model the automated Information flow. The rules governing the flow of Information are based on the hierarchy already in place, for example: A senior can view any Information owned by any of his/her direct subordinates. Second, SIF characterizes external organization entities as a special case of internal organization entities, allowing for seamless integration of the Information flow to and from them. Third, the SIF framework is independent of platform, method, organization, or technology. This gives it a generic nature that makes it applicable as a platform to implement multiple types of automated e-systems such as e-commerce, e-education, e-training, e-governance, etc. In this body of work, we formally define the SIF framework using state transformation language and a visual representation scheme specifically developed for this purpose. We also define the Information Interfaces, which are the mechanism for implementing rules- and constraint-based Information flow in SIF.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Information flow"

1

van, Eijck J., and Visser Albert, eds. Logic and information flow. Cambridge, Mass: MIT Press, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abramsky, Samson, and Michael Mislove, eds. Mathematical Foundations of Information Flow. Providence, Rhode Island: American Mathematical Society, 2012. http://dx.doi.org/10.1090/psapm/071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wix, Jeffrey. Information flow in building services. Bracknell: Building Services Research and Information Association, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Third World Cultural and Information Services Coop. International flow of cultural information. Paris: Division of Study and Planning of Development, Unesco, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Silva, Flávio Soares Corrêa da. and Agustí i. Cullell Jaume, eds. Information flow and knowledge sharing. Amsterdam: Elsevier, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Freedom of information reform in China: Information flow analysis. Milton Park, Abingdon, Oxon: Routledge, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alvim, Mário S., Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, and Geoffrey Smith. The Science of Quantitative Information Flow. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-96131-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dretske, Fred I. Knowledge and the flow of information. Stanford, CA: CSLI Publications, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hillairet, Caroline. Portfolio optimization with different information flow. London [England]: ISTE Press Ltd, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zavou, Angeliki. Information Flow Auditing in the Cloud. [New York, N.Y.?]: [publisher not identified], 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Information flow"

1

Tranquillo, Joe. "Information Flow." In An Introduction to Complex Systems, 175–214. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02589-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Palamidessi, Catuscia, Mário S. Alvim, and Miguel E. Andrés. "Interactive Information Flow." In Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 111. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16074-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Le Guernic, Gurvan. "Information Flow Testing." In Lecture Notes in Computer Science, 33–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-76929-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Scheben, Christoph, and Simon Greiner. "Information Flow Analysis." In Lecture Notes in Computer Science, 453–71. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49812-6_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Töws, Manuel, and Heike Wehrheim. "Information Flow Certificates." In Theoretical Aspects of Computing – ICTAC 2018, 435–54. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02508-3_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rabehaja, Tahiry, Annabelle McIver, Carroll Morgan, and Georg Struth. "Categorical Information Flow." In The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy, 329–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31175-9_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Weik, Martin H. "information flow control." In Computer Science and Communications Dictionary, 775. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bangsow, Steffen. "Information Flow Objects." In Manufacturing Simulation with Plant Simulation and SimTalk, 183–221. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-05074-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nielson, Flemming, and Hanne Riis Nielson. "Lightweight Information Flow." In Models, Languages, and Tools for Concurrent and Distributed Programming, 455–70. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21485-2_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bangsow, Steffen. "Information Flow, Controls." In Tecnomatix Plant Simulation, 181–272. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41544-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information flow"

1

Sekar, R. "Information Flow." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3411502.3418421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alvim, Mário S., Miguel E. Andrés, and Catus Palamidessi. "Probabilistic Information Flow." In 2010 25th Annual IEEE Symposium on Logic in Computer Science (LICS 2010). IEEE, 2010. http://dx.doi.org/10.1109/lics.2010.53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pasquier, Thomas F. J. M., Jean Bacon, and David Eyers. "FlowK: Information Flow Control for the Cloud." In 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2014. http://dx.doi.org/10.1109/cloudcom.2014.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Colmenero, Gerardo, and David Goldstein. "Turbulent Boundary Layer Control Using Wall Information." In 2nd AIAA Flow Control Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2004. http://dx.doi.org/10.2514/6.2004-2116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Haibo, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huang, and Pen-chung Yew. "Control flow obfuscation with information flow tracking." In the 42nd Annual IEEE/ACM International Symposium. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1669112.1669162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

McCamant, Stephen, and Michael D. Ernst. "Quantitative information flow as network flow capacity." In the 2008 ACM SIGPLAN conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1375581.1375606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Publisher's Information." In 2013 Data-Flow Execution Models for Extreme Scale Computing (DFM). IEEE, 2013. http://dx.doi.org/10.1109/dfm.2013.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Publisher's Information." In 2012 Data-Flow Execution Models for Extreme Scale Computing (DFM). IEEE, 2012. http://dx.doi.org/10.1109/dfm.2012.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Hanbing, Isabelle Puaut, and Erven Rohou. "Traceability of Flow Information." In the 22nd International Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2659787.2659805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Guttman, Joshua. "Information Flow and Invariance." In 1987 IEEE Symposium on Security and Privacy. IEEE, 1987. http://dx.doi.org/10.1109/sp.1987.10022.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Information flow"

1

Quittek, J., S. Bryant, B. Claise, P. Aitken, and J. Meyer. Information Model for IP Flow Information Export. RFC Editor, January 2008. http://dx.doi.org/10.17487/rfc5102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Claise, B., and B. Trammell, eds. Information Model for IP Flow Information Export (IPFIX). RFC Editor, September 2013. http://dx.doi.org/10.17487/rfc7012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McLean, John. Security Models and Information Flow. Fort Belvoir, VA: Defense Technical Information Center, January 1990. http://dx.doi.org/10.21236/ada462529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Boschi, E., B. Trammell, L. Mark, and T. Zseby. Exporting Type Information for IP Flow Information Export (IPFIX) Information Elements. RFC Editor, July 2009. http://dx.doi.org/10.17487/rfc5610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Trammell, B., and E. Boschi. Bidirectional Flow Export Using IP Flow Information Export (IPFIX). RFC Editor, January 2008. http://dx.doi.org/10.17487/rfc5103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Aitken, P. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information. Edited by B. Claise and B. Trammell. RFC Editor, September 2013. http://dx.doi.org/10.17487/rfc7011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sadasivan, G., N. Brownlee, B. Claise, and J. Quittek. Architecture for IP Flow Information Export. RFC Editor, March 2009. http://dx.doi.org/10.17487/rfc5470.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zseby, T., E. Boschi, N. Brownlee, and B. Claise. IP Flow Information Export (IPFIX) Applicability. RFC Editor, March 2009. http://dx.doi.org/10.17487/rfc5472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Trammell, B., A. Wagner, and B. Claise. Flow Aggregation for the IP Flow Information Export (IPFIX) Protocol. RFC Editor, September 2013. http://dx.doi.org/10.17487/rfc7015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Claise, B., ed. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information. RFC Editor, January 2008. http://dx.doi.org/10.17487/rfc5101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography