http://portal.acm.org/Information flow type systems provide an elegant means to enforce confidentiality of programs. Using the proof assistant Isabelle/HOL, we have machine-checked a recent work of Boudol and Castellani~\cite{BC02:tcs}, which defines an information flow type system for a concurrent language with scheduling, and shows that typable programs are non-interferent. As a benefit of using a proof assistant, we are able to deal with a more general language than the one studied by Boudol and Castellani. The development constitutes to our best knowledge the first machine-checked account of non-interference for a concurrent language
Noninterference is typically used as a baseline security policy to formalize confidentiality of secr...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Research in information-flow security aims at developing methods to identify undesired information l...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
International audienceInformation flow type systems provide an elegant means to enforce confidential...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
International audienceNon-interference guarantees the absence of illicit information flow throughout...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
Non-interference is a program property that ensures the absence of information leaks. In the context...
Part 1: Full PapersInternational audienceConstant-time programming is a countermeasure to prevent ca...
AbstractType systems and program logics are often thought to be at opposing ends of the spectrum of ...
We present interpretations of type systems for secure information flow in Hoare logic, complementing...
submitted to TOPLAS in September 2007Non-interference is a semantical condition on programs that gua...
Noninterference is typically used as a baseline security policy to formalize confidentiality of secr...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Research in information-flow security aims at developing methods to identify undesired information l...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
International audienceInformation flow type systems provide an elegant means to enforce confidential...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
International audienceNon-interference guarantees the absence of illicit information flow throughout...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
Non-interference is a program property that ensures the absence of information leaks. In the context...
Part 1: Full PapersInternational audienceConstant-time programming is a countermeasure to prevent ca...
AbstractType systems and program logics are often thought to be at opposing ends of the spectrum of ...
We present interpretations of type systems for secure information flow in Hoare logic, complementing...
submitted to TOPLAS in September 2007Non-interference is a semantical condition on programs that gua...
Noninterference is typically used as a baseline security policy to formalize confidentiality of secr...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Research in information-flow security aims at developing methods to identify undesired information l...