Proceedings of the 12th IEEE Computer Security Foundations Workshop
DOI: 10.1109/csfw.1999.779776
|View full text |Cite
|
Sign up to set email alerts
|

What is intransitive noninterference?

Abstract: The

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
90
0

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 94 publications
(90 citation statements)
references
References 11 publications
0
90
0
Order By: Relevance
“…* =⇒ Reese from Mike and offers this, along with Reese resell.r. 20 =⇒ Eve, as proof to Harry that she is authorized for this rate at his hotel.…”
Section: Subterfugementioning
confidence: 99%
See 3 more Smart Citations
“…* =⇒ Reese from Mike and offers this, along with Reese resell.r. 20 =⇒ Eve, as proof to Harry that she is authorized for this rate at his hotel.…”
Section: Subterfugementioning
confidence: 99%
“…Reese issues a certificate for Reese resell.r. 20 =⇒ Eve. However, Eve obtains the intercepted certificate Harry resell.r.…”
Section: Subterfugementioning
confidence: 99%
See 2 more Smart Citations
“…RCFNDC is equivalent when applied to deterministic processes to a number of standard information flow properties, including [16] at least all those that are no stronger than Roscoe's Lazy Independence [14,Section 12.4] and no weaker than Ryan's traces formulation of noninterference [18,Equation 1]. Therefore, we adopt Weakened RCFNDC and its associated automatic refinement check [12] to test for information flow here.…”
Section: Testing Information Flowmentioning
confidence: 99%