AbstractIn this paper, we first define bisimulation-based non-deterministic admissible interference(BNAI), derive its process-theoretic characterization and present a compositional verification method with respect to the main operators over communicating processes, generalizing in this way the similar trace-based results obtained in [19] into the finer notion of observation-based bisimulation [6]. Like its trace-based version, BNAI admits information flow between secrecy levels only through a downgrader (e.g. a cryptosystem), but is phrased into a generalization of observational equivalence [18]. We then describe an admissible interference-based method for the analysis of cryptographic protocols, extending, in a non-trivial way, the non int...
Bisimulation between processes has been proven a successful method for formalizing security properti...
Many security properties of cryptographic protocols can be all seen as specific instances of a gener...
International audienceIn the field of Security, process equivalences have been used to char- acterize...
ABSTRACT: In this paper, we first define bisimulation-based non-deterministic admissible interferenc...
AbstractIn this paper, we first define bisimulation-based non-deterministic admissible interference(...
Non-interference has been advocated by various authors as a uniform framework for the formal specifi...
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was sh...
ABSTRACT: Meadows recently proposed a formal cost-based framework for the analysis of denial of serv...
Abstract. We develop a theory of non-interference for a typed version of the pi-calculus where types...
ABSTRACT: The specification and validation of security protocols often requires viewing function cal...
The concept of non-interference has been introduced to characterise the absence of undesired informa...
The concept of non-interference has been introduced to characterise the absence of undesired informa...
Non-interference in discrete event systems deals with the possibility by an intruder to infer the oc...
Meadows recently proposed a formal cost-based framework for the analysis of denial of service, showi...
This paper shows that quasi-open bisimilarity is the coarsest bisimilarity congruence for the applie...
Bisimulation between processes has been proven a successful method for formalizing security properti...
Many security properties of cryptographic protocols can be all seen as specific instances of a gener...
International audienceIn the field of Security, process equivalences have been used to char- acterize...
ABSTRACT: In this paper, we first define bisimulation-based non-deterministic admissible interferenc...
AbstractIn this paper, we first define bisimulation-based non-deterministic admissible interference(...
Non-interference has been advocated by various authors as a uniform framework for the formal specifi...
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was sh...
ABSTRACT: Meadows recently proposed a formal cost-based framework for the analysis of denial of serv...
Abstract. We develop a theory of non-interference for a typed version of the pi-calculus where types...
ABSTRACT: The specification and validation of security protocols often requires viewing function cal...
The concept of non-interference has been introduced to characterise the absence of undesired informa...
The concept of non-interference has been introduced to characterise the absence of undesired informa...
Non-interference in discrete event systems deals with the possibility by an intruder to infer the oc...
Meadows recently proposed a formal cost-based framework for the analysis of denial of service, showi...
This paper shows that quasi-open bisimilarity is the coarsest bisimilarity congruence for the applie...
Bisimulation between processes has been proven a successful method for formalizing security properti...
Many security properties of cryptographic protocols can be all seen as specific instances of a gener...
International audienceIn the field of Security, process equivalences have been used to char- acterize...