On the verification of intransitive noninterference in mulitlevel security
暂无分享,去创建一个
Nejib Ben Hadj-Alouane | Feng Lin | John Mullins | Stéphane Lafrance | Mohamed Moez Yeddes | F. Lin | N. Hadj-Alouane | J. Mullins | M. Yeddes | S. Lafrance
[1] Peter Y. A. Ryan,et al. Process algebra and non-interference , 2001 .
[2] Roberto Gorrieri,et al. Secrecy in Security Protocols as Non Interference , 1999, Workshop on Secure Architectures and Information Flow.
[3] Peter Y. A. Ryan,et al. Process algebra and non-interference , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[4] John Mullins. Nondeterministic Admissible Interference , 2000, J. Univers. Comput. Sci..
[5] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[6] John Rushby,et al. Noninterference, Transitivity, and Channel-Control Security Policies 1 , 2005 .
[7] A. W. Roscoe,et al. What is intransitive noninterference? , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[8] D UllmanJeffrey,et al. Introduction to automata theory, languages, and computation, 2nd edition , 2001 .
[9] Roberto Gorrieri,et al. Message Authentication through Non Interference , 2000, AMAST.
[10] Nejib Ben Hadj-Alouane,et al. Characterizing intransitive noninterference for 3-domain security policies with observability , 2005, IEEE Transactions on Automatic Control.
[11] Markus G. Kuhn,et al. Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[12] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .
[13] J. Thomas Haigh,et al. Extending The Non-Interference Version Of MLS For Sat , 1987, 1986 IEEE Symposium on Security and Privacy.
[14] John Mullins,et al. An Information Flow Method to Detect Denial of Service Vulnerabilities , 2003, J. Univers. Comput. Sci..
[15] Walter Murray Wonham,et al. On observability of discrete-event systems , 1988, Inf. Sci..
[16] R.,et al. A CLASSIFICATION OF SECURITY PROPERTIES FOR PROCESS ALGEBRAS 1 , 1994 .
[17] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[18] Steve A. Schneider. Verifying Authentication Protocols in CSP , 1998, IEEE Trans. Software Eng..
[19] Catherine A. Meadows,et al. A Cost-Based Framework for Analysis of Denial of Service Networks , 2001, J. Comput. Secur..
[20] P. Ramadge,et al. Supervisory control of a class of discrete event processes , 1987 .