2020
DOI: 10.1007/978-3-030-51831-8_7
|View full text |Cite
|
Sign up to set email alerts
|

Interleaving vs True Concurrency: Some Instructive Security Examples

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 28 publications
0
1
0
Order By: Relevance
“…Concrete semantics, such as team bisimilarity, which observe also the structure of the distributed state are resource aware, and so potentially more useful in practical applications. For instance, the security paper [36] shows that an illegal information flow cannot be detected if the low user cannot observe the structure of the state.…”
Section: A1 Associativitymentioning
confidence: 99%
“…Concrete semantics, such as team bisimilarity, which observe also the structure of the distributed state are resource aware, and so potentially more useful in practical applications. For instance, the security paper [36] shows that an illegal information flow cannot be detected if the low user cannot observe the structure of the state.…”
Section: A1 Associativitymentioning
confidence: 99%