Algebraic laws for nondeterminism and concurrency
Journal of the ACM (JACM)
A formal basis for architectural connection
ACM Transactions on Software Engineering and Methodology (TOSEM)
Static checking of system behaviors using derived component assumptions
ACM Transactions on Software Engineering and Methodology (TOSEM)
Process algebra and non-interference
Journal of Computer Security
Compatibility and inheritance in software architectures
Science of Computer Programming
Communication and Concurrency
Automated Software Engineering
Secure Information Flow for Concurrent Processes
CONCUR '00 Proceedings of the 11th International Conference on Concurrency Theory
On Compositional Reasoning in the Spi-calculus
FoSSaCS '02 Proceedings of the 5th International Conference on Foundations of Software Science and Computation Structures
Compositional Verification of Integrity for Digital Stream Signature Protocols
ACSD '03 Proceedings of the Third International Conference on Application of Concurrency to System Design
Casper: A Compiler for the Analysis of Security Protocols
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Information Flow Analysis in a Discrete-Time Process Algebra
CSFW '00 Proceedings of the 13th IEEE workshop on Computer Security Foundations
On the Composition of Secure Systems
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Formal Methods for Software Architectures: Third International School on Formal Methods for the Design of Computer, Communication, and Software Systems--Software Architectures, Sfm 2003 (Lecture Notes in Computer Science, 2804)
A process-algebraic approach for the analysis of probabilistic noninterference
Journal of Computer Security
On the usability of process algebra: an architectural view
Theoretical Computer Science - Process algebra
Using equivalence-checking to verify robustness to denial of service
Computer Networks: The International Journal of Computer and Telecommunications Networking
Classification of security properties in a Linda-like process algebra
Science of Computer Programming - Special issue on security issues in coordination models, languages, and systems
Compositional analysis of contract-signing protocols
Theoretical Computer Science - Automated reasoning for security protocol analysis
The software model checker Blast: Applications to software engineering
International Journal on Software Tools for Technology Transfer (STTT)
A framework for compositional verification of security protocols
Information and Computation
A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference
Foundations and Applications of Security Analysis
A Process Algebraic Approach to Software Architecture Design
A Process Algebraic Approach to Software Architecture Design
Journal of Systems and Software
Secure Systems Development with UML
Secure Systems Development with UML
Hi-index | 0.00 |
Component-based software engineering often relies on libraries of trusted components that are combined to build dependable and secure software systems. Resource dependences, constraint conflicts, and information flow interferences arising from component combination that may violate security requirements can be revealed by means of the noninterference approach to information flow analysis. However, the security of large component-based systems may be hard to assess in an efficient and systematic way. In this paper, we propose a component-oriented formulation of noninterference that enables compositional security verification driven by system topology. This is realized by implementing scalable noninterference checks in the formal framework of a process algebraic architectural description language equipped with equivalence checking techniques.