Reactive noninterference
… , we explore definitions of noninterference for reactive programs and identify two of …
noninterference for a simple sequential language, the other to termination-sensitive noninterference. …
noninterference for a simple sequential language, the other to termination-sensitive noninterference. …
Reactive non-interference for a browser model
… for reactive non-interference. In a later paper, Bohannon et al. [2] develop Featherweight
Firefox, an extensive formalization of a web browser as a reactive … for reactive non-interference, …
Firefox, an extensive formalization of a web browser as a reactive … for reactive non-interference, …
Typing noninterference for reactive programs
AA Matos, G Boudol, I Castellani - The Journal of Logic and Algebraic …, 2007 - Elsevier
… We study the security property of noninterference for a class of synchronous programs
called reactive programs. We consider a core reactive language, obtained by extending the …
called reactive programs. We consider a core reactive language, obtained by extending the …
[PDF][PDF] Reactive non-interference for the browser: extended version
… A first contribution of this paper is the development of an enforcement technique for
reactive non-interference based on secure multi-execution [7]. We prove two major results: …
reactive non-interference based on secure multi-execution [7]. We prove two major results: …
Fine-grained and coarse-grained reactive noninterference
P Attar, I Castellani - International Symposium on Trustworthy Global …, 2013 - Springer
… of noninterference in a core synchronous reactive language that we name \(CRL\). In the
synchronous reactive … for the study of noninterference in a synchronous reactive language. The …
synchronous reactive … for the study of noninterference in a synchronous reactive language. The …
Precise enforcement of confidentiality for reactive systems
… We define the non-interference notion of ID-security for reactive programs [9, 11] as follows.
… In order to guarantee progress, we consider a stronger notion of non-interference for reactive …
… In order to guarantee progress, we consider a stronger notion of non-interference for reactive …
China debates the non-interference principle
C Zheng - The Chinese Journal of International Politics, 2016 - academic.oup.com
… non-interference debate thus reflects the conflicting orientations that underlie the worldview
of contemporary China, and the non-interference … to sovereignty and non-interference, which …
of contemporary China, and the non-interference … to sovereignty and non-interference, which …
Approximate non-interference
A Di Pierro, C Hankin… - Journal of Computer …, 2004 - content.iospress.com
… Classical approaches are based on non-interference models which depend ultimately on …
We present a model in which the notion of non-interference is approximated in the sense that it …
We present a model in which the notion of non-interference is approximated in the sense that it …
Enforcing reactive noninterference with reachability analysis
C Sun, L Tang, Z Chen - 2011 Eighth International Conference …, 2011 - ieeexplore.ieee.org
… The column NI of Table II means the security of program with respect to our definition of
noninterference of reactive program. /means secure and × means insecure. 3 7,3 8 are not ID-…
noninterference of reactive program. /means secure and × means insecure. 3 7,3 8 are not ID-…
Intransitive non-interference for cryptographic purposes
M Backes, B Pfitzmann - 2003 Symposium on Security and …, 2003 - ieeexplore.ieee.org
… probabilistic non-interference. Our definitions are very general in several ways: They are
designed for reactive scenarios. We do not only consider perfect non-interference as in Gray’s …
designed for reactive scenarios. We do not only consider perfect non-interference as in Gray’s …