Sciweavers

253 search results - page 1 / 51
» Security Analysis using Flow Logics
Sort
View
EATCS
2000
64views more  EATCS 2000»
13 years 5 months ago
Security Analysis using Flow Logics
Chiara Bodei, Pierpaolo Degano, Flemming Nielson, ...
SPC
2005
Springer
13 years 10 months ago
A Theorem Proving Approach to Analysis of Secure Information Flow
Abstract. Most attempts at analysing secure information flow in programs are based on domain-specific logics. Though computationally feahese approaches suffer from the need for ...
Ádám Darvas, Reiner Hähnle, Dav...
SIGADA
2004
Springer
13 years 10 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
COORDINATION
2008
Springer
13 years 7 months ago
From Flow Logic to Static Type Systems for Coordination Languages
Abstract. Coordination languages are often used to describe open ended systems. This makes it challenging to develop tools for guaranteeing security of the coordinated systems and ...
Rocco De Nicola, Daniele Gorla, René Rydhof...
TISSEC
2010
142views more  TISSEC 2010»
13 years 23 hour ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...