We dene two alternative notions related to the security of information ow. The rst one is a weaker form of non-interference, which we call nondeterministic noninterfer-ence. It gives the view of the high-level user (Harry) on the requirements a system must satisfy in order for infor-mation about his activity not to be leaked to low-level. The second one is based on a semantic framework for dening the deductions that the low-level user makes by observing system behavior, and especially on the fact that a new de-duction does not contradict a previous one. This second notion gives the low-level user (Larry’s) view on the char-acterization of the systems which do not allow him to gain information about high-level activity. We then show that the...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
This paper addresses the question of how TA-security, a semantics for intransitive information-flow ...
Abstract. Current standard security practices do not provide substan-tial assurance about informatio...
Abstract. We generalize the synchronous model of Wittbold & Johnson to a nondeterministic settin...
Non-interference happens when some elements of a dynamic system do not interfere, i.e., do not a ect...
Part 1: PrivacyInternational audienceNoninterference is a property that captures confidentiality of ...
We develop a theory of information flow that differs from Nondeducibility’s, which we see is really ...
Abstract—This paper addresses the question of how TA-security, a semantics for intransitive informat...
Doctor of PhilosophyDepartment of Computing and Information SciencesDavid A. Schmidt, Anindya Banerj...
With the intensification of communication in information systems, interest in security has increased...
Doctor of PhilosophyDepartment of Computing and Information SciencesDavid A. Schmidt, Anindya Banerj...
With the intensification of communication in information systems, interest in security has increased...
With the intensification of communication in information systems, interest in security has increased...
With the intensification of communication in information systems, interest in security has increased...
We address the problem of characterising the security of a program against unauthorised information ...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
This paper addresses the question of how TA-security, a semantics for intransitive information-flow ...
Abstract. Current standard security practices do not provide substan-tial assurance about informatio...
Abstract. We generalize the synchronous model of Wittbold & Johnson to a nondeterministic settin...
Non-interference happens when some elements of a dynamic system do not interfere, i.e., do not a ect...
Part 1: PrivacyInternational audienceNoninterference is a property that captures confidentiality of ...
We develop a theory of information flow that differs from Nondeducibility’s, which we see is really ...
Abstract—This paper addresses the question of how TA-security, a semantics for intransitive informat...
Doctor of PhilosophyDepartment of Computing and Information SciencesDavid A. Schmidt, Anindya Banerj...
With the intensification of communication in information systems, interest in security has increased...
Doctor of PhilosophyDepartment of Computing and Information SciencesDavid A. Schmidt, Anindya Banerj...
With the intensification of communication in information systems, interest in security has increased...
With the intensification of communication in information systems, interest in security has increased...
With the intensification of communication in information systems, interest in security has increased...
We address the problem of characterising the security of a program against unauthorised information ...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
This paper addresses the question of how TA-security, a semantics for intransitive information-flow ...
Abstract. Current standard security practices do not provide substan-tial assurance about informatio...