Bisimulation and Unwinding for Verifying Possibilistic Security Properties
VMCAI 2003 Proceedings of the 4th International Conference on Verification, Model Checking, and Abstract Interpretation
Confidentiality-Preserving Refinement is Compositional - Sometimes
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Securing Communication in a Concurrent Language
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
A unifying approach to the security of distributed and multi-threaded programs
Journal of Computer Security - Special issue on CSFW14
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
The framework of selective interleaving functions and the modular assembly kit
Proceedings of the 2005 ACM workshop on Formal methods in security engineering
A derivation system and compositional logic for security protocols
Journal of Computer Security
Protocol Composition Logic (PCL)
Electronic Notes in Theoretical Computer Science (ENTCS)
Cryptographic voting protocols: a systems perspective
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
A framework for compositional verification of security protocols
Information and Computation
Run-Time Enforcement of Nonsafety Policies
ACM Transactions on Information and System Security (TISSEC)
Requirements and protocols for inference-proof interactions in information systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Compositional System Security with Interface-Confined Adversaries
Electronic Notes in Theoretical Computer Science (ENTCS)
Security engineering for embedded systems: the SecFutur vision
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems
Unifying theories of confidentiality
UTP'10 Proceedings of the Third international conference on Unifying theories of programming
Component-oriented verification of noninterference
Journal of Systems Architecture: the EUROMICRO Journal
Privacy enforcement and analysis for functional active objects
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Verifying persistent security properties
Computer Languages, Systems and Structures
Non-interference on UML state-charts
TOOLS'12 Proceedings of the 50th international conference on Objects, Models, Components, Patterns
Proving concurrent noninterference
CPP'12 Proceedings of the Second international conference on Certified Programs and Proofs
Compositional verification of application-level security properties
ESSoS'13 Proceedings of the 5th international conference on Engineering Secure Software and Systems
Hi-index | 0.00 |
When complex systems are constructed from simpler components it isimportant to know how properties of the components behave undercomposition. In this article, we present various compositionalityresults for security properties. In particular, we introduce a novelsecurity property and show that this property is, in general,composable although it is weaker than forward correctability.Moreover, we demonstrate that certain nontrivial security propertiesemerge under composition and illustrate how this fact can beexploited.All compositionality results that we present areverified with the help of a single, quite powerful lemma. Basing onthis lemma, we also re-prove several already known compositionalityresults with the objective to unify these results. As a side effect,we obtain a classification of known compositionality results forsecurity properties.