Abstract. Current standard security practices do not provide substan-tial assurance about information flow security: the end-to-end behav-ior of a computing system. Noninterference is the basic semantical con-dition used to account for information flow security. In the literature, there are many definitions of noninterference: Non-inference, Separabil-ity and so on. Mantel presented a framework of Basic Security Predicates (BSPs) for characterizing the definitions of noninterference in the litera-ture. Model-checking these BSPs for finite state systems was shown to be decidable in [8]. In this paper, we show that verifying these BSPs for the more expressive system model of pushdown systems is undecidable. We also give an example of a simple...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
Current standard security practices do not provide substantial assurance about information flow secu...
Current standard security practices do not provide substantial assurance about information flow secu...
Current standard security practices do not provide substantial assurance about information flow secu...
Current standard security practices do not provide substantial assurance about information flow secu...
Abstract. Information flow control is an important area in computer security. It aims at restricting...
Information flow properties are away of specifying security properties of systems ,dating back to th...
AbstractWe present an automated verification technique to verify trace based information flow proper...
Bisimulation-based information flow properties were introduced by Focardi and Gorrieri [1] as a way ...
Bisimulation-based information flow properties were introduced by Focardi and Gorrieri [1] as a way ...
We develop a theory of information flow that differs from Nondeducibility’s, which we see is really ...
We propose an approach on model checking information flow for imperative language with procedures. W...
We present an automated verification technique to verify trace based information flow properties for...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
Current standard security practices do not provide substantial assurance about information flow secu...
Current standard security practices do not provide substantial assurance about information flow secu...
Current standard security practices do not provide substantial assurance about information flow secu...
Current standard security practices do not provide substantial assurance about information flow secu...
Abstract. Information flow control is an important area in computer security. It aims at restricting...
Information flow properties are away of specifying security properties of systems ,dating back to th...
AbstractWe present an automated verification technique to verify trace based information flow proper...
Bisimulation-based information flow properties were introduced by Focardi and Gorrieri [1] as a way ...
Bisimulation-based information flow properties were introduced by Focardi and Gorrieri [1] as a way ...
We develop a theory of information flow that differs from Nondeducibility’s, which we see is really ...
We propose an approach on model checking information flow for imperative language with procedures. W...
We present an automated verification technique to verify trace based information flow properties for...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
The formalisation of security properties for computer systems raises the problem of overcoming also ...