Reactive noninterference

A Bohannon, BC Pierce, V Sjöberg, S Weirich… - Proceedings of the 16th …, 2009 - dl.acm.org
… , we explore definitions of noninterference for reactive programs and identify two of …
noninterference for a simple sequential language, the other to termination-sensitive noninterference. …

Reactive non-interference for a browser model

N Bielova, D Devriese, F Massacci… - 2011 5th International …, 2011 - ieeexplore.ieee.org
… for reactive non-interference. In a later paper, Bohannon et al. [2] develop Featherweight
Firefox, an extensive formalization of a web browser as a reactive … for reactive non-interference, …

Typing noninterference for reactive programs

AA Matos, G Boudol, I Castellani - The Journal of Logic and Algebraic …, 2007 - Elsevier
… We study the security property of noninterference for a class of synchronous programs
called reactive programs. We consider a core reactive language, obtained by extending the …

[PDF][PDF] Reactive non-interference for the browser: extended version

N Bielova, D Devriese, F Massacci… - CW Reports CW602 …, 2011 - lirias.kuleuven.be
… A first contribution of this paper is the development of an enforcement technique for
reactive non-interference based on secure multi-execution [7]. We prove two major results: …

Fine-grained and coarse-grained reactive noninterference

P Attar, I Castellani - International Symposium on Trustworthy Global …, 2013 - Springer
… of noninterference in a core synchronous reactive language that we name \(CRL\). In the
synchronous reactive … for the study of noninterference in a synchronous reactive language. The …

Precise enforcement of confidentiality for reactive systems

D Zanarini, M Jaskelioff, A Russo - 2013 IEEE 26th Computer …, 2013 - ieeexplore.ieee.org
… We define the non-interference notion of ID-security for reactive programs [9, 11] as follows.
… In order to guarantee progress, we consider a stronger notion of non-interference for reactive

China debates the non-interference principle

C Zheng - The Chinese Journal of International Politics, 2016 - academic.oup.com
non-interference debate thus reflects the conflicting orientations that underlie the worldview
of contemporary China, and the non-interference … to sovereignty and non-interference, which …

Approximate non-interference

A Di Pierro, C Hankin… - Journal of Computer …, 2004 - content.iospress.com
… Classical approaches are based on non-interference models which depend ultimately on …
We present a model in which the notion of non-interference is approximated in the sense that it …

Enforcing reactive noninterference with reachability analysis

C Sun, L Tang, Z Chen - 2011 Eighth International Conference …, 2011 - ieeexplore.ieee.org
… The column NI of Table II means the security of program with respect to our definition of
noninterference of reactive program. /means secure and × means insecure. 3 7,3 8 are not ID-…

Intransitive non-interference for cryptographic purposes

M Backes, B Pfitzmann - 2003 Symposium on Security and …, 2003 - ieeexplore.ieee.org
… probabilistic non-interference. Our definitions are very general in several ways: They are
designed for reactive scenarios. We do not only consider perfect non-interference as in Gray’s …