Fluid Information Systems

Christian W. Probst, Rene Rydhof Hansen

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

4 Citations (Scopus)

Abstract

Networked communication systems and the data they make available
have, over the last decades, made their way to the very core
of both society and business. Not only do they support everyday
life and day-to-day operations, in many cases they enable them in
the first place, and often are among the most valuable assets. The
flexibility that makes them so valuable in the first place, is also
their primary vulnerability: via the network, an entity’s data is accessible
from almost everywhere, often without the need of physical
presence in the entity’s perimeter. In this work we propose a
new security paradigm, that aims at using the network’s flexibility
to move data and applications away from potential attackers. We
also present a possible realization of the proposed paradigm, based
on recent advances in language-based security and static analysis,
where data and applications are partitioned ahead-of-time and can
be moved automatically based on activity both in the network as
well as the real world.
Original languageEnglish
Title of host publicationProceedings of the New Security Paradigms Workshop (NSPW'09)
Number of pages8
PublisherAssociation for Computing Machinery
Publication date2009
ISBN (Electronic)978-1-60558-845-2
Publication statusPublished - 2009
EventNew Security Paradigms Workshop (NSPW'09) - Oxford, United Kingdom
Duration: 8 Sept 200911 Sept 2009

Conference

ConferenceNew Security Paradigms Workshop (NSPW'09)
Country/TerritoryUnited Kingdom
CityOxford
Period08/09/200911/09/2009

Fingerprint

Dive into the research topics of 'Fluid Information Systems'. Together they form a unique fingerprint.

Cite this