A CSP formulation of non-interference and unwinding
Cipher: IEEE Computer Society Technical Committee Newsletter on Security & Privacy
Certification of programs for secure information flow
Communications of the ACM
Triggered message sequence charts
Proceedings of the 10th ACM SIGSOFT symposium on Foundations of software engineering
Mathematical Models of Computer Security
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Information Flow Analysis in a Discrete-Time Process Algebra
CSFW '00 Proceedings of the 13th IEEE workshop on Computer Security Foundations
Static analysis and computer security: new techniques for software assurance
Static analysis and computer security: new techniques for software assurance
Refinement-Based Requirements Modeling Using TriggeredMessage Sequence Charts
RE '03 Proceedings of the 11th IEEE International Conference on Requirements Engineering
Triggered message sequence charts
Triggered message sequence charts
Hi-index | 0.00 |
This paper argues for performing information-flow-based securityanalysis in the first phase of the software development life cycle itself ie in the requirements elicitation phase Message Sequence Charts (MSC)s have been widely accepted as a formal scenario-based visual notation for writing down requirements In this paper, we discuss a method for checking if a TMSC (Triggered Message Sequence Chart), a recently propsed enhancement to classical MSCs, satisifes one of the most important information flow properties namely non-interference.