“Classical” proofs of secure systems are based on reducing the hardness of one problem (defined by the protocol) to that of another (a known difficult computational problem). In standard program development [1,3,14] this “comparative approach” features in stepwise refinement: describe a system as simply as possible so that it has exactly the required properties and then apply sound refinement rules to obtain an implementation comprising specific algorithms and data-structures. More recently the stepwise refinement method has been extended to include “information flow” properties as well as functional properties, thus supporting proofs about secrecy within a program refinement method. In this paper we review the security-by-refinement approa...
Abstract. A truly secure protocol is one which never violates its se-curity requirements, no matter ...
When giving a program access to secret information, one must ensure that the program does not le...
When giving a program access to secret information, one must ensure that the program does not le...
Stepwise refinement is a crucial conceptual tool for system development, encour-aging program constr...
A truly secure protocol is one which never violates its security requirements, no matter how bizarre...
Abstract. We address the problem of maintaining information flow security un-der refinement and tran...
AbstractStepwise refinement is a crucial conceptual tool for system development, encouraging program...
The systematic development of complex systems usually relies on a stepwise refinement procedure from...
We propose a general framework of secrecy and preservation of secrecy for labeled transition systems...
“Classical” program development by refinement [12,2,3] is a technique for ensuring that source-level...
We address the problem of maintaining information flow security un-der refinement and transformation...
We propose a general framework of secrecy and preservation of secrecy for labeled transition systems...
A truly secure protocol is one which never violates its security requirements, no matter how bizarre...
-We address the problem of maintaining information flow security under refinement and transformation...
Abstract. A truly secure protocol is one which never violates its se-curity requirements, no matter ...
Abstract. A truly secure protocol is one which never violates its se-curity requirements, no matter ...
When giving a program access to secret information, one must ensure that the program does not le...
When giving a program access to secret information, one must ensure that the program does not le...
Stepwise refinement is a crucial conceptual tool for system development, encour-aging program constr...
A truly secure protocol is one which never violates its security requirements, no matter how bizarre...
Abstract. We address the problem of maintaining information flow security un-der refinement and tran...
AbstractStepwise refinement is a crucial conceptual tool for system development, encouraging program...
The systematic development of complex systems usually relies on a stepwise refinement procedure from...
We propose a general framework of secrecy and preservation of secrecy for labeled transition systems...
“Classical” program development by refinement [12,2,3] is a technique for ensuring that source-level...
We address the problem of maintaining information flow security un-der refinement and transformation...
We propose a general framework of secrecy and preservation of secrecy for labeled transition systems...
A truly secure protocol is one which never violates its security requirements, no matter how bizarre...
-We address the problem of maintaining information flow security under refinement and transformation...
Abstract. A truly secure protocol is one which never violates its se-curity requirements, no matter ...
Abstract. A truly secure protocol is one which never violates its se-curity requirements, no matter ...
When giving a program access to secret information, one must ensure that the program does not le...
When giving a program access to secret information, one must ensure that the program does not le...