The paper gives necessary and sufficient conditions for a system to satisfy intransitive non-interference. Security is defined in terms of allowable flows of information among action domains as represented by an interferes relation ~>. We examine properties of special sets called basis elements generated from the relation ~> and introduce the notion of absorbing covers which is associated with the standard unwinding theorems for non-interference. Our approach separates the equivalence relation arguments from the non-interference properties, and as a by product, we develop a decision procedure for non-interference. An upper bound on the number of iterations needed for termination of the procedure is provide
In this paper we provide a survey on the framework of abstract non-interference. In particular, we d...
arXiv:1102.5161International audienceNon-interference, in transitive or intransitive form, is define...
We develop a theory of non-interference for multilevel security based on causality, with Petri nets ...
Non-interference happens when some elements of a dynamic system do not interfere, i.e., do not a ect...
An interactive system is a system that allows communication with the users. This communi- cation is ...
Abstract. We study non-interference based security in a dynamic set-ting, where the security policy ...
This paper addresses the question of how TA-security, a semantics for intransitive information-flow ...
In this paper we introduce the notion of abstract non-interference as a general theory for reasoning...
In this paper we study the relationship between two models of secure information flow: the PER model...
We develop a theory of non-interference for multilevel security domains based on causality, with Pet...
In this paper we provide a survey on the framework of abstract non-interference. In particular, we d...
1 Introduction Non-interference was introduced by Goguen and Meseguer in their seminal paper [14]in ...
The information security community has long debated the exact definition of the term ‘security’. Eve...
Abstract. In this paper, we focus on distributed systems subject to security issues. Such systems ar...
Intransitive non-interference (INI for short) is a behavioural property extensively studied by Rushb...
In this paper we provide a survey on the framework of abstract non-interference. In particular, we d...
arXiv:1102.5161International audienceNon-interference, in transitive or intransitive form, is define...
We develop a theory of non-interference for multilevel security based on causality, with Petri nets ...
Non-interference happens when some elements of a dynamic system do not interfere, i.e., do not a ect...
An interactive system is a system that allows communication with the users. This communi- cation is ...
Abstract. We study non-interference based security in a dynamic set-ting, where the security policy ...
This paper addresses the question of how TA-security, a semantics for intransitive information-flow ...
In this paper we introduce the notion of abstract non-interference as a general theory for reasoning...
In this paper we study the relationship between two models of secure information flow: the PER model...
We develop a theory of non-interference for multilevel security domains based on causality, with Pet...
In this paper we provide a survey on the framework of abstract non-interference. In particular, we d...
1 Introduction Non-interference was introduced by Goguen and Meseguer in their seminal paper [14]in ...
The information security community has long debated the exact definition of the term ‘security’. Eve...
Abstract. In this paper, we focus on distributed systems subject to security issues. Such systems ar...
Intransitive non-interference (INI for short) is a behavioural property extensively studied by Rushb...
In this paper we provide a survey on the framework of abstract non-interference. In particular, we d...
arXiv:1102.5161International audienceNon-interference, in transitive or intransitive form, is define...
We develop a theory of non-interference for multilevel security based on causality, with Petri nets ...