Sciweavers

253 search results - page 1 / 51
» Security Analysis using Flow Logics
Sort
View
EATCS
2000
64views more  EATCS 2000»
15 years 28 days ago
Security Analysis using Flow Logics
Chiara Bodei, Pierpaolo Degano, Flemming Nielson, ...
127
Voted
SPC
2005
Springer
15 years 6 months ago
A Theorem Proving Approach to Analysis of Secure Information Flow
Abstract. Most attempts at analysing secure information flow in programs are based on domain-specific logics. Though computationally feahese approaches suffer from the need for ...
Ádám Darvas, Reiner Hähnle, Dav...
118
Voted
SIGADA
2004
Springer
15 years 6 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
COORDINATION
2008
Springer
15 years 2 months ago
From Flow Logic to Static Type Systems for Coordination Languages
Abstract. Coordination languages are often used to describe open ended systems. This makes it challenging to develop tools for guaranteeing security of the coordinated systems and ...
Rocco De Nicola, Daniele Gorla, René Rydhof...
111
Voted
TISSEC
2010
142views more  TISSEC 2010»
14 years 7 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...