Current standard security practices do not provide substantial assurance about information flow security: the end-to-end behavior of a computing system. Noninterference is the basic semantical condition used to account for information flow security. In the literature, there are many definitions of noninterference for nondeterministic systems: Non-inference, Separability and so on. Mantel presented a framework of Basic Security Predicates (BSPs) for characterizing the definitions of noninterference in the literature. Model-checking these BSPs for finite state systems was shown to be decidable in our earlier paper. In this paper, we show that verifying these BSPs for the more expressive system model of pushdown systems is undecidable. We als...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
Current standard security practices do not provide substantial assurance about information flow secu...
Current standard security practices do not provide substantial assurance about information flow secu...
Current standard security practices do not provide substantial assurance about information flow secu...
Abstract. Current standard security practices do not provide substan-tial assurance about informatio...
Abstract. Information flow control is an important area in computer security. It aims at restricting...
Information flow properties are away of specifying security properties of systems ,dating back to th...
Bisimulation-based information flow properties were introduced by Focardi and Gorrieri [1] as a way ...
Bisimulation-based information flow properties were introduced by Focardi and Gorrieri [1] as a way ...
AbstractWe present an automated verification technique to verify trace based information flow proper...
Noninterference is the basic semantical condition used to account for confidentiality and integrity-...
AbstractThe paper discusses the problem of model checking a number of noninterference properties in ...
The paper considers the complexity of verifying that a finite state system satisfies a number of def...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
Current standard security practices do not provide substantial assurance about information flow secu...
Current standard security practices do not provide substantial assurance about information flow secu...
Current standard security practices do not provide substantial assurance about information flow secu...
Abstract. Current standard security practices do not provide substan-tial assurance about informatio...
Abstract. Information flow control is an important area in computer security. It aims at restricting...
Information flow properties are away of specifying security properties of systems ,dating back to th...
Bisimulation-based information flow properties were introduced by Focardi and Gorrieri [1] as a way ...
Bisimulation-based information flow properties were introduced by Focardi and Gorrieri [1] as a way ...
AbstractWe present an automated verification technique to verify trace based information flow proper...
Noninterference is the basic semantical condition used to account for confidentiality and integrity-...
AbstractThe paper discusses the problem of model checking a number of noninterference properties in ...
The paper considers the complexity of verifying that a finite state system satisfies a number of def...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
The formalisation of security properties for computer systems raises the problem of overcoming also ...
The formalisation of security properties for computer systems raises the problem of overcoming also ...