A proof system for information flow security
DOI10.1007/3-540-45013-0_16zbMATH Open1278.68158OpenAlexW1522409694WikidataQ62045718 ScholiaQ62045718MaRDI QIDQ3079920FDOQ3079920
Authors: Annalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi
Publication date: 4 March 2011
Published in: Logic Based Program Synthesis and Transformation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-45013-0_16
Recommendations
Data encryption (aspects in computer science) (68P25) Specification and verification (program logics, model checking, etc.) (68Q60)
Cited In (22)
- Information flow security and recursive systems.
- Information flow certificates
- Unwinding biological systems
- A Logical System for Modular Information Flow Verification
- Compositional refinement in agent-based security protocols
- The shadow knows: refinement and security in sequential programs
- Transforming processes to check and ensure information flow security
- A Policy Model for Secure Information Flow
- CoSMed: a confidentiality-verified social media platform
- Probabilistic information flow security in dynamic context
- Verifying persistent security properties
- Persistent stochastic non-interference
- \textit{D\_PSNI}: delimited persistent stochastic non-interference
- On refinement-closed security properties and nondeterministic compositions
- Rule formats for compositional non-interference properties
- Architectural refinement and notions of intransitive noninterference
- Abstractions of non-interference security: probabilistic versus possibilistic
- Title not available (Why is that?)
- Title not available (Why is that?)
- Flow logic for Dolev–Yao secrecy in cryptographic processes
- Information flow in systems with schedulers. II: Refinement
- Action Refinement in Process Algebra and Security Issues
This page was built for publication: A proof system for information flow security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3079920)