Language-based information-flow security
A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …
behavior of a computing system satisfies important security policies such as confidentiality …
[图书][B] Secure systems development with UML
J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …
High-quality development of security-critical systems is difficult, mainly because of the …
A classification of security properties for process algebras
R Focardi, R Gorrieri - Journal of Computer security, 1995 - content.iospress.com
Several information flow security definitions, proposed in the literature, are generalized and
adapted to the model of labelled transition systems. This very general model has been …
adapted to the model of labelled transition systems. This very general model has been …
Classification of Security Properties: (Part I: Information Flow)
R Focardi, R Gorrieri - International School on Foundations of Security …, 2000 - Springer
In the recent years, many formalizations of security properties have been proposed, most of
which are based on different underlying models and are consequently difficult to compare. A …
which are based on different underlying models and are consequently difficult to compare. A …
Secrecy in multiagent systems
JY Halpern, KR O'Neill - ACM Transactions on Information and System …, 2008 - dl.acm.org
We introduce a general framework for reasoning about secrecy requirements in multiagent
systems. Our definitions extend earlier definitions of secrecy and nondeducibility given by …
systems. Our definitions extend earlier definitions of secrecy and nondeducibility given by …
Non-interference for deterministic interactive programs
We consider the problem of defining an appropriate notion of non-interference (NI) for
deterministic interactive programs. Previous work on the security of interactive programs by …
deterministic interactive programs. Previous work on the security of interactive programs by …
Probabilistic noninterference through weak probabilistic bisimulation
G Smith - 16th IEEE Computer Security Foundations Workshop …, 2003 - ieeexplore.ieee.org
To be practical, systems for ensuring secure information flow must be as permissive as
possible. To this end, the author recently proposed a type system for multi-threaded …
possible. To this end, the author recently proposed a type system for multi-threaded …
Securing databases from probabilistic inference
M Guarnieri, S Marinovic… - 2017 IEEE 30th Computer …, 2017 - ieeexplore.ieee.org
Databases can leak confidential information when users combine query results with
probabilistic data dependencies and prior knowledge. Current research offers mechanisms …
probabilistic data dependencies and prior knowledge. Current research offers mechanisms …
Real-time information flow analysis
In previous work, we studied some noninterference properties for information flow analysis
in computer systems on classic (possibilistic) labeled transition systems. In this paper, some …
in computer systems on classic (possibilistic) labeled transition systems. In this paper, some …
Foundations of security analysis and design: tutorial lectures
R Focardi, R Gorrieri - 2003 - books.google.com
Security is a rapidly growing area of computer science, with direct and increasing relevance
to real life applications such as Internet transactions, electronic commerce, information …
to real life applications such as Internet transactions, electronic commerce, information …