ABSTRACT: In this paper, we first define bisimulation-based non-deterministic admissible interference(BNAI), derive its process-theoretic characterization and present a compositional verification method with respect to the main operators over communicating processes, generalizing in this way the similar trace-based results obtained in [19] into the finer notion of observation-based bisimulation [6]. Like its trace-based version, BNAI admits information flow between secrecy levels only through a downgrader (e.g. a cryptosystem), but is phrased into a generalization of observational equivalence [18]. We then describe an admissible interference-based method for the analysis of cryptographic protocols, extending, in a non-trivial way, the non i...
International audienceNon-interference (NI) is a property of systems stating that confidential actio...
ABSTRACT: The specification and validation of security protocols often requires viewing function cal...
AbstractNon Interference [8] has been proposed for modelling and analysing information flow in syste...
AbstractIn this paper, we first define bisimulation-based non-deterministic admissible interference(...
ABSTRACT: Meadows recently proposed a formal cost-based framework for the analysis of denial of serv...
Non-interference has been advocated by various authors as a uniform framework for the formal specifi...
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was sh...
Non interference [GM82] was originally proposed as a means for analyzing the security of computer sy...
Meadows recently proposed a formal cost-based framework for the analysis of denial of service, showi...
AbstractCryptographic protocols have so far been analyzed for the most part by means of testing (whi...
Abstract. We develop a theory of non-interference for a typed version of the pi-calculus where types...
Non-interference in discrete event systems deals with the possibility by an intruder to infer the oc...
Many security properties are naturally expressed as indistinguishability between two versions of a p...
Bisimulation between processes has been proven a successful method for formalizing security properti...
Indistinguishability properties are essential in formal verification of cryptographic protocols. The...
International audienceNon-interference (NI) is a property of systems stating that confidential actio...
ABSTRACT: The specification and validation of security protocols often requires viewing function cal...
AbstractNon Interference [8] has been proposed for modelling and analysing information flow in syste...
AbstractIn this paper, we first define bisimulation-based non-deterministic admissible interference(...
ABSTRACT: Meadows recently proposed a formal cost-based framework for the analysis of denial of serv...
Non-interference has been advocated by various authors as a uniform framework for the formal specifi...
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was sh...
Non interference [GM82] was originally proposed as a means for analyzing the security of computer sy...
Meadows recently proposed a formal cost-based framework for the analysis of denial of service, showi...
AbstractCryptographic protocols have so far been analyzed for the most part by means of testing (whi...
Abstract. We develop a theory of non-interference for a typed version of the pi-calculus where types...
Non-interference in discrete event systems deals with the possibility by an intruder to infer the oc...
Many security properties are naturally expressed as indistinguishability between two versions of a p...
Bisimulation between processes has been proven a successful method for formalizing security properti...
Indistinguishability properties are essential in formal verification of cryptographic protocols. The...
International audienceNon-interference (NI) is a property of systems stating that confidential actio...
ABSTRACT: The specification and validation of security protocols often requires viewing function cal...
AbstractNon Interference [8] has been proposed for modelling and analysing information flow in syste...