Non-interference happens when some elements of a dynamic system do not interfere, i.e., do not a ect, other elements in the same system. Originally introduced in language-based security, non-interference means that the manipulation of private information has no e ect on public observations of data. In this paper we introduce abstract non-interference as a weakening of non-interference by abstract interpretation. Abstract non- interference is parametric on which private information we want to protect and which are the observational capabilities of the external observer, i.e., what the attacker can observe of a computation and of the data manipulated during the computation. This allows us to model a variety of situations in information- ow se...
We dene two alternative notions related to the security of information ow. The rst one is a weaker f...
The information security community has long debated the exact defini-tion of the term ‘security’. Ev...
The information security community has long debated the exact definition of the term “security”. Eve...
In this paper we introduce the notion of abstract non-interference as a general theory for reasoning...
In this paper we generalize the notion of non-interference making it parametric relatively to what a...
In this paper, we illustrate the role of the notion of Abstract Non-Interference in language based s...
In this paper we provide a survey on the framework of abstract non-interference. In particular, we d...
In this paper we provide a survey on the framework of abstract non-interference. In particular, we d...
In this paper we study the relationship between two models of secure information flow: the PER model...
We address the problem of characterising the security of a program against unauthorised information ...
We address the problem of characterising the security of a program against unauthorised information ...
Abstract non-interference has been introduced as a method for weakening standard non-interference by...
In this paper, we provide an inductive proof system for a notion of abstractnon-interference which f...
In this paper we prove that attack models and information released in language-based security can be...
The information security community has long debated the exact definition of the term ‘security’. Eve...
We dene two alternative notions related to the security of information ow. The rst one is a weaker f...
The information security community has long debated the exact defini-tion of the term ‘security’. Ev...
The information security community has long debated the exact definition of the term “security”. Eve...
In this paper we introduce the notion of abstract non-interference as a general theory for reasoning...
In this paper we generalize the notion of non-interference making it parametric relatively to what a...
In this paper, we illustrate the role of the notion of Abstract Non-Interference in language based s...
In this paper we provide a survey on the framework of abstract non-interference. In particular, we d...
In this paper we provide a survey on the framework of abstract non-interference. In particular, we d...
In this paper we study the relationship between two models of secure information flow: the PER model...
We address the problem of characterising the security of a program against unauthorised information ...
We address the problem of characterising the security of a program against unauthorised information ...
Abstract non-interference has been introduced as a method for weakening standard non-interference by...
In this paper, we provide an inductive proof system for a notion of abstractnon-interference which f...
In this paper we prove that attack models and information released in language-based security can be...
The information security community has long debated the exact definition of the term ‘security’. Eve...
We dene two alternative notions related to the security of information ow. The rst one is a weaker f...
The information security community has long debated the exact defini-tion of the term ‘security’. Ev...
The information security community has long debated the exact definition of the term “security”. Eve...