The theory of noninterference supports the analysis and the execution of secure computations in multi-level security systems. Classical equivalence-based approaches to noninterference mainly rely on weak bisimulation semantics. We show that this approach is not sufficient to identify potential covert channels in the presence of reversible computations. As illustrated via a database management system example, the activation of backward computations may trigger information flows that are not observable when proceeding in the standard forward direction. To capture the effects of back and forth computations, it is necessary to move to a sufficiently expressive semantics that, in an interleaving framework, has been proven to be branching bisimi...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
This paper is concerned with bisimulation relations which do not only require related agents to simu...
Branching bisimilarity and branching bisimilarity with explicit divergences are typically used in pr...
The theory of noninterference supports the analysis and the execution of secure computations in mult...
Noninterference is the basic semantical condition used to account for confidentiality and integrity-...
Reversible systems feature both forward computations and backward computations, where the latter und...
We study bisimulation-based information flow security properties which are persistent, in the sense ...
Bisimulations are equivalence relations between transition systems which assure that certain aspects...
We introduce a process calculus for nondeterministic systems that are reversible, i.e., capable of u...
Reversibility is the capability of a system of undoing its own actions starting from the last perfor...
This note presents a detailed proof of a result in the theory of concurrency semantics that is alrea...
Branching bisimilarity and branching bisimilarity with explicit divergences are typically used in pr...
Abstract. Current standard security practices do not provide substan-tial assurance about informatio...
Current standard security practices do not provide substantial assurance about information flow secu...
We develop a theory of noninterference for a typed version of the \u3c0- calculus where types are us...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
This paper is concerned with bisimulation relations which do not only require related agents to simu...
Branching bisimilarity and branching bisimilarity with explicit divergences are typically used in pr...
The theory of noninterference supports the analysis and the execution of secure computations in mult...
Noninterference is the basic semantical condition used to account for confidentiality and integrity-...
Reversible systems feature both forward computations and backward computations, where the latter und...
We study bisimulation-based information flow security properties which are persistent, in the sense ...
Bisimulations are equivalence relations between transition systems which assure that certain aspects...
We introduce a process calculus for nondeterministic systems that are reversible, i.e., capable of u...
Reversibility is the capability of a system of undoing its own actions starting from the last perfor...
This note presents a detailed proof of a result in the theory of concurrency semantics that is alrea...
Branching bisimilarity and branching bisimilarity with explicit divergences are typically used in pr...
Abstract. Current standard security practices do not provide substan-tial assurance about informatio...
Current standard security practices do not provide substantial assurance about information flow secu...
We develop a theory of noninterference for a typed version of the \u3c0- calculus where types are us...
We perform a formal analysis of compositionality techniques for proving possibilistic noninterferenc...
This paper is concerned with bisimulation relations which do not only require related agents to simu...
Branching bisimilarity and branching bisimilarity with explicit divergences are typically used in pr...