2006
DOI: 10.1016/j.comnet.2005.06.011
|View full text |Cite
|
Sign up to set email alerts
|

Using equivalence-checking to verify robustness to denial of service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2011
2011

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…If two systems are secure according to this principle, then their composition is secure as well. Based on similar ideas, several papers ( [13,19,14,26,8,7] to cite a few) apply compositional reasoning to the verification of security protocols.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…If two systems are secure according to this principle, then their composition is secure as well. Based on similar ideas, several papers ( [13,19,14,26,8,7] to cite a few) apply compositional reasoning to the verification of security protocols.…”
Section: Discussionmentioning
confidence: 99%
“…Its application to security is based on the idea that an undesired interference from a high-security level part of the system to another one at low-security level can be revealed by comparing different system views that are obtained by changing the behavior of the interfering high-security level components (see, e.g., [29,16,27]). While the original definition of noninterference is not component oriented, several approaches in the literature have subsequently proposed a compositional treatment of it (see, e.g., [23,13,28,19,32,14,26,8,7]). In this paper, we extend previous work by introducing a component-oriented formulation of noninterference that enables compositional security verification driven by system topology.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation