scholarly journals Enforcing Distributed Information Flow Policies Architecturally: The SAID Approach

Author(s):  
Arnab Ray
2016 ◽  
Vol 28 (2) ◽  
pp. 295-307 ◽  
Author(s):  
Alexander Schlegel ◽  
Prescott Alexander ◽  
Peter U. Tse

The brain is a complex, interconnected information processing network. In humans, this network supports a mental workspace that enables high-level abilities such as scientific and artistic creativity. Do the component processes underlying these abilities occur in discrete anatomical modules, or are they distributed widely throughout the brain? How does the flow of information within this network support specific cognitive functions? Current approaches have limited ability to answer such questions. Here, we report novel multivariate methods to analyze information flow within the mental workspace during visual imagery manipulation. We find that mental imagery entails distributed information flow and shared representations throughout the cortex. These findings challenge existing, anatomically modular models of the neural basis of higher-order mental functions, suggesting that such processes may occur at least in part at a fundamentally distributed level of organization. The novel methods we report may be useful in studying other similarly complex, high-level informational processes.


2016 ◽  
Vol 13 (4) ◽  
pp. 119-130 ◽  
Author(s):  
Ning Xi ◽  
Cong Sun ◽  
Jianfeng Ma ◽  
Xiaofeng Chen ◽  
Yulong Shen

2013 ◽  
Vol 336-338 ◽  
pp. 2348-2353 ◽  
Author(s):  
Bo Yu ◽  
Lin Yang ◽  
Shu Hui Chen ◽  
Lin Ru Ma

Service computing facilitates resource sharing and business collaboration for cross-domain partiers by universal service description and discovery. The multi-domain nature of service oriented environments introduces challenging security issues, especially with regard to information flow control which controls the flow of privacy resources. This paper presents a state-of-the-art review of information flow control technology in service oriented environments. We review the research background and classifications of information flow control, and discuss architecture and existing technologies of both centralized and distributed information flow approach. We outline the features, advantages and limitations of existing information flow control approaches. The analysis results show that the research of collaboration and dynamic nature are important, but insufficient to secure information flow.


Sign in / Sign up

Export Citation Format

Share Document