The non-interference (NI) property defines a program to be secure if changes to high-security inputs cannot alter the values of low-security outputs. NI indirectly states the epistemic property that no low-security principal acquires knowledge of high-security data. We consider a directly epistemic account of information flow (IF) security focusing on the knowledge flows engendered by the pro-gram’s execution. Storage effects are of primary interest, since prin-cipals acquire knowledge from the execution only through these ef-fects. The IF properties of the individual effectful actions are char-acterized using a substructural epistemic logic that accounts for the knowledge transferred through their execution. We prove that a low-security pr...
To speak about the security of information flow in programs employing cryptographic operations, defi...
Cryptographic operations are essential for many security-critical systems. Reasoning about informati...
We present a general unwinding framework for the definition of information flow security properties ...
We develop a theory of information flow that differs from Nondeducibility’s, which we see is really ...
We set out a logic for reasoning about multilevel security of probabilistic systems. This logic incl...
AbstractA classic problem in security is that of checking that a program has secure information flow...
Non-interference happens when some elements of a dynamic system do not interfere, i.e., do not a ect...
Temporal epistemic logic is a well-established framework for expressing agents knowledge and how it ...
In this paper we introduce the notion of abstract non-interference as a general theory for reasoning...
We present interpretations of type systems for secure information flow in Hoare logic, complementing...
Abstract. Current standard security practices do not provide substan-tial assurance about informatio...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
Enforcing the confidentiality and integrity of information is critical in distributed applications....
We give a formal definition of the notion of information flow for a simple guarded command language....
We address the problem of characterising the security of a program against unauthorised information ...
To speak about the security of information flow in programs employing cryptographic operations, defi...
Cryptographic operations are essential for many security-critical systems. Reasoning about informati...
We present a general unwinding framework for the definition of information flow security properties ...
We develop a theory of information flow that differs from Nondeducibility’s, which we see is really ...
We set out a logic for reasoning about multilevel security of probabilistic systems. This logic incl...
AbstractA classic problem in security is that of checking that a program has secure information flow...
Non-interference happens when some elements of a dynamic system do not interfere, i.e., do not a ect...
Temporal epistemic logic is a well-established framework for expressing agents knowledge and how it ...
In this paper we introduce the notion of abstract non-interference as a general theory for reasoning...
We present interpretations of type systems for secure information flow in Hoare logic, complementing...
Abstract. Current standard security practices do not provide substan-tial assurance about informatio...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
Enforcing the confidentiality and integrity of information is critical in distributed applications....
We give a formal definition of the notion of information flow for a simple guarded command language....
We address the problem of characterising the security of a program against unauthorised information ...
To speak about the security of information flow in programs employing cryptographic operations, defi...
Cryptographic operations are essential for many security-critical systems. Reasoning about informati...
We present a general unwinding framework for the definition of information flow security properties ...