2017
DOI: 10.1007/978-3-319-73721-8_20
|View full text |Cite
|
Sign up to set email alerts
|

A Logical System for Modular Information Flow Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 27 publications
0
1
0
Order By: Relevance
“…Modular approaches based on information flow control are based on enforcing information flow control independently on each fragment of the program, protocol or software system. The enforced properties are then proven to be preserved at the whole program [206], protocol [8] or system level [277]. Andova et al [8], propose a framework to verify security protocols built from smaller subprotocols by first verifying that the subprotocols are independent and then analyzing each subprotocol in isolation.…”
Section: Modular Security Analysismentioning
confidence: 99%
“…Modular approaches based on information flow control are based on enforcing information flow control independently on each fragment of the program, protocol or software system. The enforced properties are then proven to be preserved at the whole program [206], protocol [8] or system level [277]. Andova et al [8], propose a framework to verify security protocols built from smaller subprotocols by first verifying that the subprotocols are independent and then analyzing each subprotocol in isolation.…”
Section: Modular Security Analysismentioning
confidence: 99%