2009
DOI: 10.1007/978-3-642-04444-1_5
|View full text |Cite
|
Sign up to set email alerts
|

Declassification with Explicit Reference Points

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 14 publications
(28 citation statements)
references
References 9 publications
0
28
0
Order By: Relevance
“…In order to convince ourselves about the adequacy of our novel security condition, we have checked WHAT&WHERE s against these principles, and we have shown that it satisfies the following prudent principles (based on the formalization of a slightly augmented set of prudent principles in [16]):…”
Section: Meta-properties Of the Scheduler-specific Security Propertiesmentioning
confidence: 99%
See 3 more Smart Citations
“…In order to convince ourselves about the adequacy of our novel security condition, we have checked WHAT&WHERE s against these principles, and we have shown that it satisfies the following prudent principles (based on the formalization of a slightly augmented set of prudent principles in [16]):…”
Section: Meta-properties Of the Scheduler-specific Security Propertiesmentioning
confidence: 99%
“…Monotonicity of release [32] Allowing further declassifications for a program that is WHAT&WHERE s -secure cannot render it insecure. Persistence [16] For every program that satisfies WHAT&WHERE s , all programs that are reachable also satisfy this security condition. Relaxation [16] Every program that satisfies noninterference also satisfies WHAT&WHERE s .…”
Section: Meta-properties Of the Scheduler-specific Security Propertiesmentioning
confidence: 99%
See 2 more Smart Citations
“…Information flow control can also guarantee that household appliances cannot be controlled directly by external software, thus protecting safety and integrity of the appliances. Information flow control will guarantee pricavy protection by introducing appropriate security levels for secret, encrypted, aggregated, and public data; analysing the information flow for all such data in the smart meter and the cockpit, and by carefully introducing declassification [30] e.g. at aggregation points.…”
Section: Information Flow Controlmentioning
confidence: 99%