A per model of secure information flow in sequential programs
From MaRDI portal
Publication:5936652
DOI10.1023/A:1011553200337zbMath0967.68039OpenAlexW1519566437MaRDI QIDQ5936652
Publication date: 3 July 2001
Published in: Higher-Order and Symbolic Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1023/a:1011553200337
securityconfidentialitynoninterferencepartial equivalence relationspowerdomainsprobabilistic covert channelssemantics
Other programming paradigms (object-oriented, sequential, concurrent, automatic, etc.) (68N19) Abstract data types; algebraic specification (68Q65)
Related Items
A temporal logic for asynchronous hyperproperties, Adjunctions on the lattices of partitions and of partial partitions, Idempotent block splitting on partial partitions. I: Isotone operators, Compositional refinement in agent-based security protocols, The shadow knows: refinement and security in sequential programs, Optimality and condensing of information flow through linear refinement, Model-Driven Information Flow Security for Component-Based Systems, Quantification of integrity, Linearity and bisimulation, Deriving Bisimulations by Simplifying Partitions, Information Flow Analysis for Valued-Indexed Data Security Compartments, Modelling declassification policies using abstract domain completeness, Timing-Sensitive Information Flow Analysis for Synchronous Systems, Quantifying Probabilistic Information Flow in Computational Reactive Systems, What You Lose is What You Leak: Information Leakage in Declassification Policies