Proceedings Computer Security Foundations Workshop IV
DOI: 10.1109/csfw.1991.151567
|View full text |Cite
|
Sign up to set email alerts
|

On the refinement of non-interference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(26 citation statements)
references
References 5 publications
0
26
0
Order By: Relevance
“…A detailed comparison between NDC-like properties and the notions proposed in [22] can be found in [3]. Paper [9], similarly to our work and [14], requires that refinement preserves some relations between processes. However, differently from what we do, only traces are considered.…”
Section: Conclusion and Related Workmentioning
confidence: 76%
See 1 more Smart Citation
“…A detailed comparison between NDC-like properties and the notions proposed in [22] can be found in [3]. Paper [9], similarly to our work and [14], requires that refinement preserves some relations between processes. However, differently from what we do, only traces are considered.…”
Section: Conclusion and Related Workmentioning
confidence: 76%
“…Other important works on refining non-interference are [11,21,22,9]. As observed in [14], in [11] it is given a method for making a specification secure after it has been sufficiently refined.…”
Section: Conclusion and Related Workmentioning
confidence: 99%
“…The first two conjuncts of the consequent follow from arguments analogous to those used above for assertions (10) and (11). The third and fourth conjunct can be established by trace induction.…”
Section: Discussionmentioning
confidence: 99%
“…For each assertion the base case where T=[] is analogous to the arguments given for assertions (10) and (11). Also for each assertion if we assume the assertion holds for T, then it holds for T.PUSH(u,s,x), T.POP(u,s), and T.TOP(u,s) by analogous arguments.…”
Section: Appendixmentioning
confidence: 99%
“…Graham-Cumming & Sanders [12] used the unwinding theorem [13][15] to describe refinement of a system such that noninterference between users in an abstract specification of the system could be preserved through more concrete representations of the system, however the results of this work were limited to noninterference, and were not extensible to more general security policies or confidentiality rules, such as those for covert channels. Enforcement of a range of security properties is possible in our approach through the use of security assertions that are explicitly checked during Alloy program analysis.…”
Section: Related Workmentioning
confidence: 99%