Research in information-flow security aims at developing methods to identify undesired information leaks within programs from private sources to public sinks. Noninterference captures this intuition. Strong security from [2] formalizes noninterference for concurrent systems. We present an Isabelle/HOL formalization of strong security for arbitrary security lattices ([2] uses a two-element security lattice). The formalization includes compositionality proofs for strong security and a soundness proof for a security type system that checks strong security for programs in a simple while language with dynamic thread creation. Our formalization of the security type system is abstract in the language for expressions and in the semantic side condit...
We embed an untyped security protocol model in the interactive theorem prover Isabelle/HOL and deriv...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
Abstract. We perform a formal analysis of compositionality techniques for prov-ing possibilistic non...
Research in information-flow security aims at developing methods to identify undesired information l...
Research in information-flow security aims at developing methods to identify undesired information l...
Research in information-flow security aims at developing methods to identify undesired information l...
We present interpretations of type systems for secure information flow in Hoare logic, complementing...
This is the author accepted manuscriptCommunication networks like the Internet form a large distribu...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
Abstract The first part of the thesis investigates confidentiality, i.e. the problem of determining ...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
This paper studies the foundations of information-flow security for interactive programs. Previous r...
The Volpano/Smith/Irvine security type systems [2] requires that variables are annotated as high (se...
It is common to prove by reasoning over source code that programs do not leak sensitive data. But do...
We embed an operational semantics for security protocols in the interactive theorem prover Isabelle/...
We embed an untyped security protocol model in the interactive theorem prover Isabelle/HOL and deriv...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
Abstract. We perform a formal analysis of compositionality techniques for prov-ing possibilistic non...
Research in information-flow security aims at developing methods to identify undesired information l...
Research in information-flow security aims at developing methods to identify undesired information l...
Research in information-flow security aims at developing methods to identify undesired information l...
We present interpretations of type systems for secure information flow in Hoare logic, complementing...
This is the author accepted manuscriptCommunication networks like the Internet form a large distribu...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
Abstract The first part of the thesis investigates confidentiality, i.e. the problem of determining ...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
This paper studies the foundations of information-flow security for interactive programs. Previous r...
The Volpano/Smith/Irvine security type systems [2] requires that variables are annotated as high (se...
It is common to prove by reasoning over source code that programs do not leak sensitive data. But do...
We embed an operational semantics for security protocols in the interactive theorem prover Isabelle/...
We embed an untyped security protocol model in the interactive theorem prover Isabelle/HOL and deriv...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
Abstract. We perform a formal analysis of compositionality techniques for prov-ing possibilistic non...