DOI: 10.1007/978-3-540-75227-1_10
|View full text |Cite
|
Sign up to set email alerts
|

Maintaining Information Flow Security Under Refinement and Transformation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…(A similar situation arises when n H = 9 and g L = 8.) It follows that Equation 13 does not imply Equation 14 in all circumstances, and so we conclude that G 0 does not satisfy π G .…”
Section: Definition 1 (Confidentiality Property)mentioning
confidence: 78%
See 2 more Smart Citations
“…(A similar situation arises when n H = 9 and g L = 8.) It follows that Equation 13 does not imply Equation 14 in all circumstances, and so we conclude that G 0 does not satisfy π G .…”
Section: Definition 1 (Confidentiality Property)mentioning
confidence: 78%
“…Several semantic frameworks (including the MAKS) for expressing a range of confidentiality properties in a uniform manner have been proposed in the security literature [5,6,9,10,12,13,14]. The objective of these frameworks is to consolidate the existing definitions of noninterference-like properties in the literature, in order to evaluate and compare these properties systematically and to enable new confidentiality properties to be defined rigorously.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…al [20] studied the problem of preservation of information flow properties under action refinement in the context of process algebra. Seehusen and Stølen [21] introduced a schema to specify and preserve secure information flow properties in the semantics of STAIRS [22]. Jürjens [23] presented a framework for preserving secrecy under refinement operators in specification framework FOCUS [24].…”
Section: Related Workmentioning
confidence: 99%
“…Recently in [24], Seehusen and Stølen addressed the problem of preserving trace-based security properties under transformations from an abstract specification to a concrete one. The particular transformations they deal with may be understood as a special case of action refinement where the concrete specification is generated automatically from the abstract specification.…”
Section: Conclusion and Related Workmentioning
confidence: 99%