3,990,939 research outputs found
Discovering information flow using a high dimensional conceptual space
This paper presents an informational inference mechanism realized via the use of a high dimensional conceptual space. More specifically, we claim to have operationalized important aspects of G?rdenforss recent three-level cognitive model. The connectionist level is primed with the Hyperspace Analogue to Language (HAL) algorithm which produces vector representations for use at the conceptual level. We show how inference at the symbolic level can be implemented by employing Barwise and Seligmans theory of information flow. This article also features heuristics for enhancing HAL-based representations via the use of quality properties, determining concept inclusion and computing concept composition. The worth of these heuristics in underpinning informational inference are demonstrated via a series of experiments. These experiments, though small in scale, show that informational inference proposed in this article has a very different character to the semantic associations produced by the Minkowski distance metric and concept similarity computed via the cosine coefficient. In short, informational inference generally uncovers concepts that are carried, or, in some cases, implied by another concept, (or combination of concepts)
Nonmalleable Information Flow: Technical Report
Noninterference is a popular semantic security condition because it offers
strong end-to-end guarantees, it is inherently compositional, and it can be
enforced using a simple security type system. Unfortunately, it is too
restrictive for real systems. Mechanisms for downgrading information are needed
to capture real-world security requirements, but downgrading eliminates the
strong compositional security guarantees of noninterference.
We introduce nonmalleable information flow, a new formal security condition
that generalizes noninterference to permit controlled downgrading of both
confidentiality and integrity. While previous work on robust declassification
prevents adversaries from exploiting the downgrading of confidentiality, our
key insight is transparent endorsement, a mechanism for downgrading integrity
while defending against adversarial exploitation. Robust declassification
appeared to break the duality of confidentiality and integrity by making
confidentiality depend on integrity, but transparent endorsement makes
integrity depend on confidentiality, restoring this duality. We show how to
extend a security-typed programming language with transparent endorsement and
prove that this static type system enforces nonmalleable information flow, a
new security property that subsumes robust declassification and transparent
endorsement. Finally, we describe an implementation of this type system in the
context of Flame, a flow-limited authorization plugin for the Glasgow Haskell
Compiler
Symbolic Quantitative Information Flow
acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages:
Information Flow in Computational Systems
We develop a theoretical framework for defining and identifying flows of
information in computational systems. Here, a computational system is assumed
to be a directed graph, with "clocked" nodes that send transmissions to each
other along the edges of the graph at discrete points in time. We are
interested in a definition that captures the dynamic flow of information about
a specific message, and which guarantees an unbroken "information path" between
appropriately defined inputs and outputs in the directed graph. Prior measures,
including those based on Granger Causality and Directed Information, fail to
provide clear assumptions and guarantees about when they correctly reflect
information flow about a message. We take a systematic approach---iterating
through candidate definitions and counterexamples---to arrive at a definition
for information flow that is based on conditional mutual information, and which
satisfies desirable properties, including the existence of information paths.
Finally, we describe how information flow might be detected in a noiseless
setting, and provide an algorithm to identify information paths on the
time-unrolled graph of a computational system.Comment: Significantly revised version which was accepted for publication at
the IEEE Transactions on Information Theor
Information Flow in Social Groups
We present a study of information flow that takes into account the
observation that an item relevant to one person is more likely to be of
interest to individuals in the same social circle than those outside of it.
This is due to the fact that the similarity of node attributes in social
networks decreases as a function of the graph distance. An epidemic model on a
scale-free network with this property has a finite threshold, implying that the
spread of information is limited. We tested our predictions by measuring the
spread of messages in an organization and also by numerical experiments that
take into consideration the organizational distance among individuals
A Verified Information-Flow Architecture
SAFE is a clean-slate design for a highly secure computer system, with
pervasive mechanisms for tracking and limiting information flows. At the lowest
level, the SAFE hardware supports fine-grained programmable tags, with
efficient and flexible propagation and combination of tags as instructions are
executed. The operating system virtualizes these generic facilities to present
an information-flow abstract machine that allows user programs to label
sensitive data with rich confidentiality policies. We present a formal,
machine-checked model of the key hardware and software mechanisms used to
dynamically control information flow in SAFE and an end-to-end proof of
noninterference for this model.
We use a refinement proof methodology to propagate the noninterference
property of the abstract machine down to the concrete machine level. We use an
intermediate layer in the refinement chain that factors out the details of the
information-flow control policy and devise a code generator for compiling such
information-flow policies into low-level monitor code. Finally, we verify the
correctness of this generator using a dedicated Hoare logic that abstracts from
low-level machine instructions into a reusable set of verified structured code
generators
Information Flow Model for Commercial Security
Information flow in Discretionary Access Control (DAC) is a well-known difficult problem. This paper formalizes the fundamental concepts and establishes a theory of information flow security. A DAC system is information flow secure (IFS), if any data never flows into the hands of owner’s enemies (explicitly denial access list.
Quantum information-flow, concretely, and axiomatically
These lecture notes survey some joint work with Samson Abramsky. Somewhat
informally I will discuss the main results in a pedestrian not too technical
way. These include: (1) `The logic of entanglement', that is, the
identification and abstract axiomatization of the `quantum information-flow'
which enables protocols such as quantum teleportation. To this means we define
strongly compact closed categories which abstractly capture the behavioral
properties of quantum entanglement. (2) `Postulates for an abstract quantum
formalism' in which classical information-flow (e.g. token exchange) is part of
the formalism. As an example, we provide a purely formal description of quantum
teleportation and prove correctness in abstract generality. In this formalism
types reflect kinds, contra the essentially typeless von Neumann formalism.
Hence even concretely this formalism manifestly improves on the usual one. (3)
`A high-level approach to quantum informatics'.Comment: Lecture notes of talks given between Summer 2003 and Spring 2004;
they appeared (I guess) as conference proceedings of both QPLII (2004) and
QI-SPIE-2 (2004); they also provide a physicist-friendly passage to the
categorical quantum axiomatic
Information flow between resting state networks
The resting brain dynamics self-organizes into a finite number of correlated
patterns known as resting state networks (RSNs). It is well known that
techniques like independent component analysis can separate the brain activity
at rest to provide such RSNs, but the specific pattern of interaction between
RSNs is not yet fully understood. To this aim, we propose here a novel method
to compute the information flow (IF) between different RSNs from resting state
magnetic resonance imaging. After haemodynamic response function blind
deconvolution of all voxel signals, and under the hypothesis that RSNs define
regions of interest, our method first uses principal component analysis to
reduce dimensionality in each RSN to next compute IF (estimated here in terms
of Transfer Entropy) between the different RSNs by systematically increasing k
(the number of principal components used in the calculation). When k = 1, this
method is equivalent to computing IF using the average of all voxel activities
in each RSN. For k greater than one our method calculates the k-multivariate IF
between the different RSNs. We find that the average IF among RSNs is
dimension-dependent, increasing from k =1 (i.e., the average voxels activity)
up to a maximum occurring at k =5 to finally decay to zero for k greater than
10. This suggests that a small number of components (close to 5) is sufficient
to describe the IF pattern between RSNs. Our method - addressing differences in
IF between RSNs for any generic data - can be used for group comparison in
health or disease. To illustrate this, we have calculated the interRSNs IF in a
dataset of Alzheimer's Disease (AD) to find that the most significant
differences between AD and controls occurred for k =2, in addition to AD
showing increased IF w.r.t. controls.Comment: 47 pages, 5 figures, 4 tables, 3 supplementary figures. Accepted for
publication in Brain Connectivity in its current for
- …
