Confidentiality-Preserving Refinement is Compositional - Sometimes
暂无分享,去创建一个
[1] Jan Jürjens,et al. Secure Information Flow for Concurrent Processes , 2000, CONCUR.
[2] Heiko Mantel,et al. On the composition of secure systems , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[3] Jean-Raymond Abrial,et al. The B-book - assigning programs to meanings , 1996 .
[4] Maritta Heisel,et al. Confidentiality-preserving refinement , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[5] Andrew William Roscoe,et al. The Theory and Practice of Concurrency , 1997 .
[6] James W. Gray,et al. Toward a mathematical foundation for information flow security , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] Jeff W. Sanders,et al. On the refinement of non-interference , 1991, Proceedings Computer Security Foundations Workshop IV.
[8] Heiko Mantel,et al. Preserving information flow properties under refinement , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[9] J. Jacob,et al. On the derivation of secure components , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[10] José Nuno Oliveira,et al. FME 2001: Formal Methods for Increasing Software Productivity , 2001, Lecture Notes in Computer Science.
[11] Jan Jürjens,et al. Secrecy-Preserving Refinement , 2001, FME.
[12] Peter Y. A. Ryan,et al. Process algebra and non-interference , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[13] Gavin Lowe,et al. Quantifying information flow , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[14] J. Michael Spivey,et al. The Z notation - a reference manual , 1992, Prentice Hall International Series in Computer Science.
[15] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[16] J. Todd Wittbold,et al. Information flow in nondeterministic systems , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.