Bisimulation between processes has been proven a successful method for formalizing security properties. We argue that in certain cases, a scheduler that has full information on the process and collaborates with the attacker can allow him to distinguish two processes even though they are bisimilar. This phenomenon is related to the issue that bisimilarity is not preserved by refinement. As a solution, we introduce a finer variant of bisimulation in which processes are required to simulate each other under the same scheduler. We formalize this notion in a variant of CCS with explicit schedulers and show that this new bisimilarity can be characterized by a refinement-preserving traditional bisimilarity. Using a third characterization of this...
Abstract. Protocols for information-hiding often use randomized primitives to obfuscate the link bet...
The controlled declassification of secrets has received much attention in research on information-fl...
AbstractWhen dealing with process calculi and automata which express both nondeterministic and proba...
Bisimulation between processes has been proven a successful method for formalizing security properti...
Abstract. Bisimulation between processes has been proven a successful method for formalizing securit...
Abstract. When modelling security protocols by means of process cal-culi that express both nondeterm...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...
The focus of work on information flow security has primarily been on definitions of security in asyn...
International audienceIn the field of Security, process equivalences have been used to char- acterize...
Abstract. This paper studies how confidentiality properties of multi-threaded programs can be verifi...
AbstractIt has been shown that secret information can be leaked to external observers through covert...
AbstractIn this paper, we first define bisimulation-based non-deterministic admissible interference(...
AbstractBisimulation expresses the equivalence of processes whose external actions are identical. So...
We study bisimulation-based information flow security properties which are persistent, in the sense ...
AbstractInformation hiding is a general concept which refers to the goal of preventing an adversary ...
Abstract. Protocols for information-hiding often use randomized primitives to obfuscate the link bet...
The controlled declassification of secrets has received much attention in research on information-fl...
AbstractWhen dealing with process calculi and automata which express both nondeterministic and proba...
Bisimulation between processes has been proven a successful method for formalizing security properti...
Abstract. Bisimulation between processes has been proven a successful method for formalizing securit...
Abstract. When modelling security protocols by means of process cal-culi that express both nondeterm...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...
The focus of work on information flow security has primarily been on definitions of security in asyn...
International audienceIn the field of Security, process equivalences have been used to char- acterize...
Abstract. This paper studies how confidentiality properties of multi-threaded programs can be verifi...
AbstractIt has been shown that secret information can be leaked to external observers through covert...
AbstractIn this paper, we first define bisimulation-based non-deterministic admissible interference(...
AbstractBisimulation expresses the equivalence of processes whose external actions are identical. So...
We study bisimulation-based information flow security properties which are persistent, in the sense ...
AbstractInformation hiding is a general concept which refers to the goal of preventing an adversary ...
Abstract. Protocols for information-hiding often use randomized primitives to obfuscate the link bet...
The controlled declassification of secrets has received much attention in research on information-fl...
AbstractWhen dealing with process calculi and automata which express both nondeterministic and proba...