On requirements and security in a CCIS

Any foundation for computer security needs to be tested to see whether it is strong enough to support a useful theory. In this paper a case study is presented which illustrates a particular foundation for confidentiality. A natural language confidentiality requirement is formalized in a calculus of information flow and analysed to assess possible conflicts.<<ETX>>

[1]  Jeremy L. Jacob A Security Framework , 1988, CSFW.

[2]  Colin O'Halloran,et al.  Refinement and Confidentiality , 1992, Refine.

[3]  Colin O'Halloran,et al.  A Calculus of Information Flow , 1990, ESORICS.

[4]  Jeremy L. Jacob The Varieties of Refinement , 1991 .

[5]  Jeremy Jacob On shared systems , 1987 .

[6]  Ugo Montanari,et al.  An Algebraic View of Interleaving and Distributed Operational Semantics for CCS , 1989, Category Theory and Computer Science.

[7]  José Meseguer,et al.  Petri nets are monoids: a new algebraic foundation for net theory , 1988, [1988] Proceedings. Third Annual Information Symposium on Logic in Computer Science.

[8]  Jeremy L. Jacob,et al.  Security specifications , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.