What, indeed, is intransitive noninterference?

R Van Der Meyden - Computer Security–ESORICS 2007: 12th European …, 2007 - Springer
This paper argues that Haigh and Young's definition of noninterference for intransitive
security policies admits information flows that are not in accordance with the intuitions it …

Model checking the information flow security of real-time systems

C Gerking, D Schubert, E Bodden - … , ESSoS 2018, Paris, France, June 26 …, 2018 - Springer
Cyber-physical systems are processing large amounts of sensitive information, but are
increasingly often becoming the target of cyber attacks. Thus, it is essential to verify the …

The complexity of intransitive noninterference

S Eggert, R van der Meyden… - 2011 IEEE Symposium …, 2011 - ieeexplore.ieee.org
The paper considers several definitions of information flow security for intransitive policies
from the point of view of the complexity of verifying whether a finite-state system is secure …

High-assurance separation kernels: a survey on formal methods

Y Zhao, D Sanán, F Zhang, Y Liu - arXiv preprint arXiv:1701.01535, 2017 - arxiv.org
Separation kernels provide temporal/spatial separation and controlled information flow to
their hosted applications. They are introduced to decouple the analysis of applications in …

Noninterference specifications for secure systems

L Nelson, J Bornholt, A Krishnamurthy… - ACM SIGOPS …, 2020 - dl.acm.org
This paper presents an analysis of noninterference specifications used in a range of formally
verified systems. The main findings are that these systems use distinct specifications and …

Social Control and Interactivity in Anonymous Public Events

MM Rahman, PWL Fong - … Symposium on Research in Computer Security, 2024 - Springer
Online event hosting platforms, such as Zoom Meetings and Twitch Streams, have
revolutionized the way we socialize with one another. These platforms offer a rich set of …

Formal specification of a generic separation kernel

F Verbeek, S Tverdyshev, O Havle, H Blasum… - Archive of Formal …, 2014 - research.tue.nl
Intransitive noninterference has been a widely studied topic in the last few decades. Several
well-established methodologies apply interactive theorem proving to formulate a …

Quantifying information flow in interactive systems

D Mestel - 2019 IEEE 32nd Computer Security Foundations …, 2019 - ieeexplore.ieee.org
We consider the problem of quantifying information flow in interactive systems, modelled as
finite-state transducers in the style of Goguen and Meseguer. Our main result is that if the …

Conditional information flow policies and unwinding relations

C Zhang - International Symposium on Trustworthy Global …, 2011 - Springer
Noninterference provides a control over information flow in systems for ensuring
confidentiality and integrity security properties. In general, user A is not allowed to interfere …

Information flow in systems with schedulers

R van der Meyden, C Zhang - 2008 21st IEEE Computer …, 2008 - ieeexplore.ieee.org
The focus of work on information flow security has primarily been on definitions of security in
asynchronous systems models. This paper considers systems with schedulers, which …