%0 Conference Proceedings %T Stream Processing with Secure Information Flow Constraints %+ Colorado State University [Fort Collins] (CSU) %+ Indiana University [South Bend] %+ University of Tulsa %A Ray, Indrakshi %A Adaikkalavan, Raman %A Xie, Xing %A Gamble, Rose %Z Part 8: Information Flow and Inference %< avec comité de lecture %( Lecture Notes in Computer Science %B 29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC) %C Fairfax, VA, United States %Y Pierangela Samarati %I Springer International Publishing %3 Data and Applications Security and Privacy XXIX %V LNCS-9149 %P 311-329 %8 2015-07-13 %D 2015 %R 10.1007/978-3-319-20810-7_22 %Z Computer Science [cs]Conference papers %X In the near future, clouds will provide situational monitoring services such as health monitoring, stock market monitoring, shopping cart monitoring, and emergency control and threat management. Offering such services requires securely processing data streams generated by multiple, possibly competing and/or complementing, organizations, such that there is no overt or covert leakage of sensitive information. We demonstrate how an information flow control model adapted from the Chinese Wall policy can be used to protect against sensitive data disclosure in data stream management system. We also develop a language based on Continuous Query Language that can be used to express information flow constraints in stream processing and provide its formal semantics. %G English %Z TC 11 %Z WG 11.3 %2 https://inria.hal.science/hal-01745816/document %2 https://inria.hal.science/hal-01745816/file/340025_1_En_22_Chapter.pdf %L hal-01745816 %U https://inria.hal.science/hal-01745816 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WG11-3 %~ IFIP-DBSEC %~ IFIP-LNCS-9149