AbstractWe model, in a process algebra framework, a variant of the well known Wide Mouthed Frog security protocol. Its relevant security properties are addressed both from a dynamic and static point of view, having operational semantics as a common starting point. In one case, we exploit techniques based on Non-Interference, while in the other one we rely on Control Flow Analysis. We then compare these techniques
Non-interference is a definition of security introduced for the analysis of confidential information...
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
The standard approach to the specification of a secure system is to present a (usually state-hased) ...
We model, in a process algebra framework, a variant of the well known Wide Mouthed Frog security pro...
AbstractControlling information flows through a system is the fundamental issue in information secur...
The information security community has long debated the exact definition of the term ‘security’. Eve...
The information security community has long debated the exact definition of the term “security”. Eve...
In this paper we study an information flow security property for systems specified as terms of a qua...
We introduce a Control Flow Analysis that statically approximates the dynamic behaviour of mobile pr...
We define several security properties for the analysis of probabilistic noninterference as a conserv...
Abstract. We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptogra...
We address the problem of characterising the security of a program against unauthorised information ...
This work introduces a formal analysis of the non-repudiation property for security protocols. Proto...
We provide a classification of noninterference-based security properties for the formal analysis of ...
Non-interference is a definition of security introduced for the analysis of confidential information...
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
The standard approach to the specification of a secure system is to present a (usually state-hased) ...
We model, in a process algebra framework, a variant of the well known Wide Mouthed Frog security pro...
AbstractControlling information flows through a system is the fundamental issue in information secur...
The information security community has long debated the exact definition of the term ‘security’. Eve...
The information security community has long debated the exact definition of the term “security”. Eve...
In this paper we study an information flow security property for systems specified as terms of a qua...
We introduce a Control Flow Analysis that statically approximates the dynamic behaviour of mobile pr...
We define several security properties for the analysis of probabilistic noninterference as a conserv...
Abstract. We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptogra...
We address the problem of characterising the security of a program against unauthorised information ...
This work introduces a formal analysis of the non-repudiation property for security protocols. Proto...
We provide a classification of noninterference-based security properties for the formal analysis of ...
Non-interference is a definition of security introduced for the analysis of confidential information...
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
The standard approach to the specification of a secure system is to present a (usually state-hased) ...