What, indeed, is intransitive noninterference?

R Van Der Meyden - Computer Security–ESORICS 2007: 12th European …, 2007 - Springer
This paper argues that Haigh and Young's definition of noninterference for intransitive
security policies admits information flows that are not in accordance with the intuitions it …

Algorithmic verification of noninterference properties

R van der Meyden, C Zhang - Electronic Notes in Theoretical Computer …, 2007 - Elsevier
The paper discusses the problem of model checking a number of noninterference properties
in finite state systems: Noninterference, Nondeducibility on Inputs, Generalised …

Information flow in systems with schedulers

R van der Meyden, C Zhang - 2008 21st IEEE Computer …, 2008 - ieeexplore.ieee.org
The focus of work on information flow security has primarily been on definitions of security in
asynchronous systems models. This paper considers systems with schedulers, which …

[PDF][PDF] A comparison of semantic models for intransitive noninterference

R van der Meyden - submitted for publication, copy at http://www …, 2007 - cse.unsw.edu.au
Noninterference is a notion of information flow security, originally defined for transitive
information flow policies. A number of different definitions of noninterference have been …

The complexity of synchronous notions of information flow security

F Cassez, R van Der Meyden, C Zhang - … , FOSSACS 2010, Held as Part of …, 2010 - Springer
The paper considers the complexity of verifying that a finite state system satisfies a number
of definitions of information flow security. The systems model considered is one in which …

Information flow security-models, verification and schedulers

C Zhang - 2009 - unsworks.unsw.edu.au
Abstract Information flow security concerns how to protect sensitive data in computer
systems by avoiding undesirable flow of information between the users of the systems. This …

Unwinding Conditional Noninterference

C Zhang - arXiv preprint arXiv:1003.3893, 2010 - arxiv.org
Noninterference provides a control over information flow in a system for ensuring
confidentiality and integrity properties. In the literature this notion has been well studied as …

[PDF][PDF] Analysis and Proofs of Properties in Intransitive Noninterference

C Lv, X Li, F Li, W Ma - International Journal of Hybrid Information …, 2015 - gvpress.com
The goal of high assurance systems development by formal verification motivates the
investigation of techniques whereby a systems design or implementation can be formally …

The Research on Definition of Multilevel Security Based on the Construction of Covert Channels

Y Huang, X Pan - International Conference on Applied Informatics and …, 2011 - Springer
Aiming at the main problem that the link between the formal definition of multilevel security
and security goal is not always clear, we propose a new definition of multilevel security …

[PDF][PDF] A Note on Noninterference in the Presence of Colluding Adversaries (Preliminary Report)

K Engelhardt - Citeseer
Whether adversaries can glean information from a distributed system in a formal sense
hinges on the definition of such a system and what can be observed by those agents. In the …