Communicating sequential processes
Communicating sequential processes
A Calculus of Communicating Systems
A Calculus of Communicating Systems
Computational Issues in Secure Interoperation
IEEE Transactions on Software Engineering
Report on the computer security foundations workshop VI
ACM SIGSAC Review
A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases
IEEE Transactions on Knowledge and Data Engineering
IEEE Transactions on Knowledge and Data Engineering
Database Concurrency Control in Multilevel Secure Database Management Systems
IEEE Transactions on Knowledge and Data Engineering
Transforming Processes to Check and Ensure Information Flow Security
AMAST '02 Proceedings of the 9th International Conference on Algebraic Methodology and Software Technology
Applying Composable Security Properties to Assessment of Information Systems
COMPSAC '96 Proceedings of the 20th Conference on Computer Software and Applications
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
A logical approach to multilevel security of probabilistic systems
Distributed Computing
A derivation system and compositional logic for security protocols
Journal of Computer Security
Algorithmic Verification of Noninterference Properties
Electronic Notes in Theoretical Computer Science (ENTCS)
Protocol Composition Logic (PCL)
Electronic Notes in Theoretical Computer Science (ENTCS)
A proof system for information flow security
LOPSTR'02 Proceedings of the 12th international conference on Logic based program synthesis and transformation
A comparison of semantic models for noninterference
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Compositional System Security with Interface-Confined Adversaries
Electronic Notes in Theoretical Computer Science (ENTCS)
A comparison of semantic models for noninterference
Theoretical Computer Science
Information flow in systems with schedulers, Part II: Refinement
Theoretical Computer Science
Hi-index | 0.01 |
A security property for trusted multilevel systems, restrictiveness, is described. It restricts the inferences a user can make about sensitive information. This property is a hookup property, or composable, meaning that a collection of secure restrictive systems when hooked together form a secure restrictive composite system. It is argued that the inference control and composability of restrictiveness make it an attractive choice for a security policy on trusted systems and processes.