We propose a type system to enforce the security property of noninterference in a core reactive language, obtained by extending the imperative language of Volpano, Smith and Irvine with reactive primitives manipulating broadcast signals and with a form of ``scheduled'' parallelism. Due to the particular nature of reactive computations, the definition of noninterference has to be adapted. We give a formulation of noninterference based on bisimulation. Our type system is inspired by that introduced by Boudol and Castellani, and independently by Smith, to cope with timing leaks in a language for parallel programs with scheduling. We establish the soundness of this type system with respect to our notion of noninterference
AbstractWe address the question of typing noninterference (NI) in the calculus CCS, in such a way th...
International audienceThis paper concerns formal models for the analysis of communication -centric s...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
We propose a type system to enforce the security property of noninterference in a core reactive lang...
AbstractWe study the security property of noninterference for a class of synchronous programs called...
AbstractWe propose a type system to ensure the property of noninterference in a system of concurrent...
Many programs operate reactively-patiently waiting for user input, running for a while producing out...
International audienceWe study the security property of noninterference in a core synchronous reacti...
Abstract. We propose a type system to ensure the property of nonin-terference in a system of concurr...
International audienceIn this note we revisit the so-called reactive programming style, which evolve...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
International audienceInformation flow type systems provide an elegant means to enforce confidential...
The reactive programming model is largely different to what we're used to as we don't have a full co...
Noninterference is a property of sequential programs that is useful for expressing security policies...
AbstractWe address the question of typing noninterference (NI) in the calculus CCS, in such a way th...
International audienceThis paper concerns formal models for the analysis of communication -centric s...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
We propose a type system to enforce the security property of noninterference in a core reactive lang...
AbstractWe study the security property of noninterference for a class of synchronous programs called...
AbstractWe propose a type system to ensure the property of noninterference in a system of concurrent...
Many programs operate reactively-patiently waiting for user input, running for a while producing out...
International audienceWe study the security property of noninterference in a core synchronous reacti...
Abstract. We propose a type system to ensure the property of nonin-terference in a system of concurr...
International audienceIn this note we revisit the so-called reactive programming style, which evolve...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
International audienceInformation flow type systems provide an elegant means to enforce confidential...
The reactive programming model is largely different to what we're used to as we don't have a full co...
Noninterference is a property of sequential programs that is useful for expressing security policies...
AbstractWe address the question of typing noninterference (NI) in the calculus CCS, in such a way th...
International audienceThis paper concerns formal models for the analysis of communication -centric s...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...