This paper proposes an extensional semantics-based formal specification of secure information-flow properties in sequential programs based on representing degrees of security by partial equivalence relations (pers). The specification clarifies and unifies a number of specific correctness arguments in the literature, and connections to other forms of program analysis. The approach is inspired by (and equivalent to) the use of partial equivalence relations in specifying binding-time analysis, and is thus able to specify security properties of higher-order functions and partially confidential data. We extend the approach to handle nondeterminism by using powerdomain semantics and show how probabilistic security properties can be f...
Abstract. We prove properties of a process calculus that is designed for analysing security protocol...
Information flow techniques typically classify information according to suitable security levels and...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
Abstract The first part of the thesis investigates confidentiality, i.e. the problem of determining ...
AbstractA classic problem in security is that of checking that a program has secure information flow...
This paper presents a technique for verifying secure information flow in concurrent programs consist...
We set out a logic for reasoning about multilevel security of probabilistic systems. This logic incl...
Securing communication in large scale distributed systems is an open problem. When multiple principa...
We give a formal definition of the notion of information flow for a simple guarded command language....
Securing communication in large scale distributed systems is an open problem. When multiple principa...
International audienceOne of the concerns in the use of computer systems is to avoid the leakage of ...
We present a general unwinding framework for the definition of information flow security properties ...
This paper presents a new, axiomatic approach to information flow in sequential and parallel progra...
We propose a method to check secure information flow in concurrent programs with synchronization. T...
Abstract. We prove properties of a process calculus that is designed for analysing security protocol...
Information flow techniques typically classify information according to suitable security levels and...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
Abstract The first part of the thesis investigates confidentiality, i.e. the problem of determining ...
AbstractA classic problem in security is that of checking that a program has secure information flow...
This paper presents a technique for verifying secure information flow in concurrent programs consist...
We set out a logic for reasoning about multilevel security of probabilistic systems. This logic incl...
Securing communication in large scale distributed systems is an open problem. When multiple principa...
We give a formal definition of the notion of information flow for a simple guarded command language....
Securing communication in large scale distributed systems is an open problem. When multiple principa...
International audienceOne of the concerns in the use of computer systems is to avoid the leakage of ...
We present a general unwinding framework for the definition of information flow security properties ...
This paper presents a new, axiomatic approach to information flow in sequential and parallel progra...
We propose a method to check secure information flow in concurrent programs with synchronization. T...
Abstract. We prove properties of a process calculus that is designed for analysing security protocol...
Information flow techniques typically classify information according to suitable security levels and...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...