Skip to main content Skip to main navigation



Discretionary Information Flow Control

Discretionary Information Flow Control

  • Duration:

Protection Profiles for Discretionary Information Flow Control

The protection of information flow is prevalently implemented with techniques like access control functions, encryption procedures or firewalls. Additionally, the transmission of information through public networks may be secured by Virtual Private Networks (VPNs) or by using a Public Key Infrastructure (PKI).

Admittedly, many IT users hesitate to use such security techniques methods because of the efforts concerning installation, administration and operation of those products. As a consequence, information, that needs to be protected, flows unprotected through public networks.

The German Information Security Agency (Bundesamt für Sicherheit in der Informationstechnik - BSI) commissioned the German Research Center for Artificial Intelligence (Deutsches Forschungszentrum für Künstliche Intelligenz - DFKI) to create two Common Criteria Protection Profiles for discretionary information flow security of IT systems....


Bundesamt für Sicherheit in der Informationstechnik Deutsche Forschungszentrum für Künstliche Intelligenz GmbH T-Systems ISS GmbH Der Bundesbeauftragte für den Datenschutz Der Bayerische Landesbeauftragte für den Datenschutz SuSE LINUX AG IT@work Trusted Solutions GmbH Utimaco Safeware AG Datapol GmbH


Bundesamt für Sicherheit in der Informationstechnik (BSI)

Publications about the project

Dimitra Tsovaltzi; Bruce McLaren; Nikol Rummel; Oliver Scheuer; Andreas Harrer; Niels Pinkwart; Isabel Braun

In: Beverley P. Woolf; Esma Aimeur; Roger Nkambou; Susanne Lajoie (Hrsg.). Proceedings of the 9th International Conference on Intelligent Tutoring Systems (ITS-08). International Conference on Intelligent Tutoring Systems (ITS-08), 9th, June 23-27, Montréal, Canada, Pages 709-711, Springer Verlag, 2008.

To the publication