First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings. 2003
DOI: 10.1109/sefm.2003.1236206
|View full text |Cite
|
Sign up to set email alerts
|

Refinement operators and information flow security

Abstract: The systematic development of complex systems usually relies on a stepwise refinement procedure from an abstract specification to a more concrete one, that can finally be implemented. The use of refinement operators preserving system properties is clearly essential since it avoids properties to be re-investigated at each development step.In this paper we formalize the notion of refinement for processes described as terms of the Security Process Algebra (SPA). We consider several information flow security prope… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2005
2005
2009
2009

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 24 publications
(35 citation statements)
references
References 21 publications
0
35
0
Order By: Relevance
“…We have also investigated the use of our construction in other frameworks where the satisfaction condition fails for unrestricted signature morphisms, the result being that the implications of our constructions are methodologically undesirable in the case of observational satisfaction, but beneficial in the case of dynamic equations in a states-as-algebras framework. The suitability of our approach for security formalisms, which also exhibit the phenomenon that security assertions tend to be unstable under refinement [8], is under investigation.…”
Section: Resultsmentioning
confidence: 99%
“…We have also investigated the use of our construction in other frameworks where the satisfaction condition fails for unrestricted signature morphisms, the result being that the implications of our constructions are methodologically undesirable in the case of observational satisfaction, but beneficial in the case of dynamic equations in a states-as-algebras framework. The suitability of our approach for security formalisms, which also exhibit the phenomenon that security assertions tend to be unstable under refinement [8], is under investigation.…”
Section: Resultsmentioning
confidence: 99%
“…We recall here the following: Strong NDC (SNDC) introduced in [3], Strong BNDC (SBNDC) introduced in [5], and Compositional P BNDC (CP BNDC) introduced in [3]. SNDC implies NDC, while the other properties imply BNDC.…”
Section: Definition 24 (Ndc and Bndc)mentioning
confidence: 99%
“…All the persistent properties mentioned above can be defined as instances of a generalized unwinding condition introduced in [3]. The idea behind the notion of unwinding is to specify some constraints on the transitions of the system which imply some global properties.…”
Section: Definition 24 (Ndc and Bndc)mentioning
confidence: 99%
See 1 more Smart Citation
“…To avoid them we could exploit an idea of generalized unwinding introduced by Bossi, Focardi, Piazza and Rossi (see [BFPR03,BMPR05]) and in this way we can obtain decidability results for active NIF for finite state systems.…”
Section: Active Attacksmentioning
confidence: 99%