Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy 1990
DOI: 10.1109/risp.1990.63846
|View full text |Cite
|
Sign up to set email alerts
|

Information flow in nondeterministic systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
155
0

Year Published

2002
2002
2013
2013

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 198 publications
(155 citation statements)
references
References 6 publications
0
155
0
Order By: Relevance
“…However, since we do not analyze the internal structure of systems (it is unavailable to the auditor), our approach can be applied to other models. We limit our discussion to deterministic systems since there are many competing generalizations of noninterference to the nondeterministic setting (e.g., [46][47][48]), but the main competitors collapse into standard noninterference in the deterministic case [49].…”
Section: Relationship With Noninterferencementioning
confidence: 99%
“…However, since we do not analyze the internal structure of systems (it is unavailable to the auditor), our approach can be applied to other models. We limit our discussion to deterministic systems since there are many competing generalizations of noninterference to the nondeterministic setting (e.g., [46][47][48]), but the main competitors collapse into standard noninterference in the deterministic case [49].…”
Section: Relationship With Noninterferencementioning
confidence: 99%
“…Early approaches focus on quantifying the capacity of covert channels between processes in multi-user systems [23,38,54]. The models predate the first published side-channel attack against cryptography [26] and are so general that it is unclear how they could be instantiated to address the problem at hand.…”
Section: Related Workmentioning
confidence: 99%
“…Several notions of noninterference have been designed to analyze sequential programs and concurrent systems (see, e.g., [25,12,22]). For instance, one of these properties, called strong nondeterministic noninterference and formalized in the CCS process algebraic setting [12], establishes whether the view of the system behavior as observed by a low-level user when the system interacts with high-level users is the same -according to weak bisimulation equivalence ≈ B [20] -as that observed by the low-level user in the absence of high-level users.…”
Section: Noninterference Analysismentioning
confidence: 99%