Non-interference through determinism
From MaRDI portal
Publication:826053
Recommendations
Cited in
(26)- Automated verification of noninterference property
- Threat scenarios as a means to formally develop secure systems
- Elements of security: Closure, convergence, and protection
- Foundations of Security Analysis and Design II
- Scheduler-independent declassification
- scientific article; zbMATH DE number 2090145 (Why is no real title available?)
- scientific article; zbMATH DE number 2100573 (Why is no real title available?)
- Security abstractions and intruder models (extended abstract)
- Unwinding Possibilistic Security Properties
- scientific article; zbMATH DE number 1884405 (Why is no real title available?)
- On integrating confidentiality and functionality in a formal method
- `Non-interference' implies equality
- Security invariants in discrete transition systems
- Communicating Sequential Processes. The First 25 Years
- Rule formats for compositional non-interference properties
- On refinement-closed security properties and nondeterministic compositions
- scientific article; zbMATH DE number 1696894 (Why is no real title available?)
- The security pi-calculus and non-interference
- A noninterference model for nondeterministic systems
- May testing, non-interference, and compositionality
- Nondeterministic admissible interference
- Tools and Algorithms for the Construction and Analysis of Systems
- Preservation of probabilistic information flow under refinement
- Creating high confidence in a separation kernel
- UTP, \textsf{\textit{Circus}}, and Isabelle
- Information flow, distributed systems, and refinement, by example
This page was built for publication: Non-interference through determinism
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q826053)