Sciweavers

13 search results - page 1 / 3
» Noninterference through Secure Multi-execution
Sort
View
ESORICS
1994
Springer
13 years 8 months ago
Non-Interference Through Determinism
A. W. Roscoe, Jim Woodcock, L. Wulf
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 2 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
CSFW
2003
IEEE
13 years 10 months ago
Probabilistic Noninterference through Weak Probabilistic Bisimulation
To be practical, systems for ensuring secure information flow must be as permissive as possible. To this end, the author recently proposed a type system for multi-threaded progra...
Geoffrey Smith
CSFW
2004
IEEE
13 years 8 months ago
Secure Information Flow by Self-Composition
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
ICDCIT
2004
Springer
13 years 10 months ago
Secure Requirements Elicitation Through Triggered Message Sequence Charts
Abstract. This paper argues for performing information-flow-based security analysis in the first phaseof the software development life cycle itself ie in the requirements elicita...
Arnab Ray, Bikram Sengupta, Rance Cleaveland