Skip to main content

Design and Evaluation of a Diffusion Tracing Function for Classified Information Among Multiple Computers

  • Conference paper
  • First Online:
Multimedia and Ubiquitous Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 240))

Abstract

In recent years, the opportunity to deal with classified information in a computer has increased, so the cases of classified information leakage have also increased. We have developed a function called “diffusion tracing function for classified information” (tracing function), which has the ability to trace the diffusion of classified information in a computer and to manage which resources might contain classified information. The classified information exchanged among the processes in multiple computers should be traced. This paper proposes a method which traces the diffusion for classified information among multiple computers. Evaluation results show the effectiveness of the proposed methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Japan Network Security Association (2008) Information Security Incident Survey Report, http://www.jnsa.org/result/incident/data/2008incident_survey_e_v1.0.pdf

  2. Tabata T, Hakomori S, Ohashi K, Uemura S, Yokoyama K, Taniguchi H (2009) Tracing classified information diffusion for protecting information leakage. IPSJ J 50(9):2088–2012 (in Japanese)

    Google Scholar 

  3. Kim CH, Keromytis DA, Covington M, Sahita R (2009) Capturing information flow with concatenated dynamic taint analysis. 2009 International conference on Availability, Reliability and Security (ARES 2009), pp 355–362

    Google Scholar 

  4. Zavou A, Portokalidis G, Keromytis DA (2011) Taint-Exchange: A generic system for cross-process and cross-host taint tracking. The 6th International Workshop on Security (IWSEC 2011), vol 7038. LNCS, pp 113–128

    Google Scholar 

  5. Garnkel T, Pfaff B, Chow J, Rosenblum M, Boneh D (2003) Terra: A virtual machine-based platform for trusted computing. In: Proceedings of 19th ACM SIGOPS Symposium on Operating System Principles (SOSP 2003), pp 193–206

    Google Scholar 

  6. Katsuno Y, Watanabe Y, Furuichi S, Kudo M (2007) Chinese-Wall process confinement for practical distributed coalitions. Proceedings of 12th ACM Symposium on Access Control Models and Technologies (SACMAT2007), pp 225–234

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Toshihiro Yamauchi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht(Outside the USA)

About this paper

Cite this paper

Otsubo, N., Uemura, S., Yamauchi, T., Taniguchi, H. (2013). Design and Evaluation of a Diffusion Tracing Function for Classified Information Among Multiple Computers. In: Park, J., Ng, JY., Jeong, HY., Waluyo, B. (eds) Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 240. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6738-6_30

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-6738-6_30

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-6737-9

  • Online ISBN: 978-94-007-6738-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics