Verifying persistent security properties
From MaRDI portal
Publication:1886452
DOI10.1016/j.cl.2004.02.005zbMath1072.68065OpenAlexW2024014242WikidataQ62045715 ScholiaQ62045715MaRDI QIDQ1886452
Riccardo Focardi, Sabina Rossi, Carla Piazza, Annalisa Bossi
Publication date: 18 November 2004
Published in: Computer Languages, Systems \& Structures (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.cl.2004.02.005
Specification and verification (program logics, model checking, etc.) (68Q60) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85)
Related Items (9)
The complexity of synchronous notions of information flow security ⋮ Controlling information release in the \(\pi\)-calculus ⋮ Combining behavioural types with security analysis ⋮ Information flow safety in multiparty sessions ⋮ Unnamed Item ⋮ Typing access control and secure information flow in sessions ⋮ Integration of a security type system into a program logic ⋮ Persistent Stochastic Non-Interference ⋮ \textit{D\_PSNI}: delimited persistent stochastic non-interference
Cites Work
- Results on the propositional \(\mu\)-calculus
- Characteristic formulae for processes with divergence
- An improved algorithm for the evaluation of fixpoint expressions
- Computer aided verification. 8th international conference, CAV '96, New Brunswick, NJ, USA, July 31 -- August 3, 1996. Proceedings
- A Proof System for Information Flow Security
- Three Partition Refinement Algorithms
- May Testing, Non-interference, and Compositionality
- Unwinding Possibilistic Security Properties
- Computer aided verification. 10th international conference, CAV'98, Vancouver, BC, Canada, June 28 -- July 2, 1998. Proceedings
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Verifying persistent security properties