Abstract. We consider the problem of defining an appropriate notion of non-interference (NI) for deterministic interactive programs. Previous work on the security of interactive programs by O’Neill, Clarkson and Chong (CSFW 2006) builds on earlier ideas due to Wittbold and Johnson (Symposium on Security and Privacy 1990), and argues for a notion of NI defined in terms of strategies modelling the behaviour of users. We show that, for deterministic interactive pro-grams, it is not necessary to consider strategies and that a simple stream model of the users ’ behaviour is sufficient. The key technical result is that, for determinis-tic programs, stream-based NI implies the apparently more general strategy-based NI (in fact we consider a wider ...
In this paper we generalize the notion of non-interference making it parametric relatively to what a...
The information security community has long debated the exact definition of the term “security”. Eve...
Non-interference has become the standard criterion for ensuring confidentiality of sensitive data in...
Abstract. We consider the problem of defining an appropriate notion of non-interference (NI) for det...
In this paper we introduce the notion of abstract non-interference as a general theory for reasoning...
Abstract. Non-interference is a security property which states that im-proper information leakages d...
Non-interference happens when some elements of a dynamic system do not interfere, i.e., do not a ect...
An interactive system is a system that allows communication with the users. This communi- cation is ...
We address the problem of characterising the security of a program against unauthorised information ...
Intransitive non-interference (INI for short) is a behavioural property extensively studied by Rushb...
This report presents a non-interference monitoring mechanism for sequential programs. Non-interferen...
We dene two alternative notions related to the security of information ow. The rst one is a weaker f...
This thesis provides means to achieve end-to-end information-flow security in interactive systems. T...
Many programs operate reactively-patiently waiting for user input, running for a while producing out...
The information security community has long debated the exact definition of the term ‘security’. Eve...
In this paper we generalize the notion of non-interference making it parametric relatively to what a...
The information security community has long debated the exact definition of the term “security”. Eve...
Non-interference has become the standard criterion for ensuring confidentiality of sensitive data in...
Abstract. We consider the problem of defining an appropriate notion of non-interference (NI) for det...
In this paper we introduce the notion of abstract non-interference as a general theory for reasoning...
Abstract. Non-interference is a security property which states that im-proper information leakages d...
Non-interference happens when some elements of a dynamic system do not interfere, i.e., do not a ect...
An interactive system is a system that allows communication with the users. This communi- cation is ...
We address the problem of characterising the security of a program against unauthorised information ...
Intransitive non-interference (INI for short) is a behavioural property extensively studied by Rushb...
This report presents a non-interference monitoring mechanism for sequential programs. Non-interferen...
We dene two alternative notions related to the security of information ow. The rst one is a weaker f...
This thesis provides means to achieve end-to-end information-flow security in interactive systems. T...
Many programs operate reactively-patiently waiting for user input, running for a while producing out...
The information security community has long debated the exact definition of the term ‘security’. Eve...
In this paper we generalize the notion of non-interference making it parametric relatively to what a...
The information security community has long debated the exact definition of the term “security”. Eve...
Non-interference has become the standard criterion for ensuring confidentiality of sensitive data in...