2011
DOI: 10.1007/978-3-642-24541-1_34
|View full text |Cite
|
Sign up to set email alerts
|

Beyond Traces and Independence

Abstract: Abstract. The formal methods, fault-tolerance, and cyber-security research communities explore models that differ from each other. The differences frustrate efforts at cross-community collaboration. Moreover, ignorance about these differences means the status quo is likely to persist. This paper discusses two of the key differences: (i) the trace-based semantic foundation for formal methods and (ii) the implicit notions of independence.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Given the above history, it is appealing to specify a cybersystem as a set of traces, and therefore as a subset of a security property that is also specified as a set of traces. Unfortunately, security properties are not trace properties as shown in [8,5,14] and refreshed below. First, noninterference is a security property that captures the intuition that system security is preserved as long as high-clearance (or high-privilege) processes cannot influence the behavior of lowclearance (low-privilege) processes.…”
Section: Example 2: Emergent Behavior Exhibited By Security Propertiementioning
confidence: 99%
“…Given the above history, it is appealing to specify a cybersystem as a set of traces, and therefore as a subset of a security property that is also specified as a set of traces. Unfortunately, security properties are not trace properties as shown in [8,5,14] and refreshed below. First, noninterference is a security property that captures the intuition that system security is preserved as long as high-clearance (or high-privilege) processes cannot influence the behavior of lowclearance (low-privilege) processes.…”
Section: Example 2: Emergent Behavior Exhibited By Security Propertiementioning
confidence: 99%