Sciweavers

119 search results - page 20 / 24
» Confidentiality-Preserving Refinement is Compositional - Som...
Sort
View
80
Voted
CSFW
1999
IEEE
15 years 1 months ago
Process Algebra and Non-Interference
The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
Peter Y. A. Ryan, Steve A. Schneider
ACSD
2004
IEEE
118views Hardware» more  ACSD 2004»
15 years 1 months ago
Verification and Implementation of Delay-Insensitive Processes in Restrictive Environments
Abstract. A delay-insensitive module communicates with its environment through wires of unbounded delay. To avoid transmission interference, the absorption of a signal transition m...
Hemangee K. Kapoor, Mark B. Josephs, Dennis P. Fur...
CSFW
2004
IEEE
15 years 1 months ago
Modelling Downgrading in Information Flow Security
Information flow security properties such as noninterference ensure the protection of confidential data by strongly limiting the flow of sensitive information. However, to deal wi...
Annalisa Bossi, Carla Piazza, Sabina Rossi
79
Voted
FM
2006
Springer
113views Formal Methods» more  FM 2006»
15 years 1 months ago
Interface Input/Output Automata
We propose a new look at one of the most fundamental types of behavioral interfaces: discrete time specifications of communication--directly related to the work of de Alfaro and H...
Kim Guldstrand Larsen, Ulrik Nyman, Andrzej Wasows...
SAC
2010
ACM
14 years 11 months ago
A heterogeneous approach to service-oriented systems specification
Service-oriented architecture (SOA) is a relatively new approach to software system development. It divides system functionality to independent, loosely coupled, interoperable ser...
Alexander Knapp, Grzegorz Marczynski, Martin Wirsi...