Sciweavers

13 search results - page 1 / 3
» Noninterference through Secure Multi-execution
Sort
View
ESORICS
1994
Springer
13 years 8 months ago
Non-Interference Through Determinism
A. W. Roscoe, Jim Woodcock, L. Wulf
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 2 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
CSFW
2003
IEEE
13 years 9 months ago
Probabilistic Noninterference through Weak Probabilistic Bisimulation
To be practical, systems for ensuring secure information flow must be as permissive as possible. To this end, the author recently proposed a type system for multi-threaded progra...
Geoffrey Smith
CSFW
2004
IEEE
13 years 8 months ago
Secure Information Flow by Self-Composition
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
ICDCIT
2004
Springer
13 years 9 months ago
Secure Requirements Elicitation Through Triggered Message Sequence Charts
Abstract. This paper argues for performing information-flow-based security analysis in the first phaseof the software development life cycle itself ie in the requirements elicita...
Arnab Ray, Bikram Sengupta, Rance Cleaveland