Mathematical Models of Computer Security
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Formal Aspects of Computing
The Shadow Knows: Refinement and security in sequential programs
Science of Computer Programming
Breaking the Model: Finalisation and a Taxonomy of Security Attacks
Electronic Notes in Theoretical Computer Science (ENTCS)
Unifying theories of confidentiality
UTP'10 Proceedings of the Third international conference on Unifying theories of programming
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Compositional noninterference from first principles
Formal Aspects of Computing
Hi-index | 0.00 |
This paper presents an approach for extending the Circus formalism to accommodate information flow security concerns. Working with the semantics of Circus, we introduce a notation for specifying which aspects of Circus processes are confidential and should not be revealed to low-level users. We also describe a novel procedure for verifying that a process satisfies its confidentiality properties.