What, indeed, is intransitive noninterference?

[1]  Henning Schnoor,et al.  Dynamic Noninterference: Consistent Policies, Characterizations and Verification , 2012, ArXiv.

[2]  Stephen Chong,et al.  Deriving epistemic conclusions from agent architecture , 2009, TARK '09.

[3]  Andrew C. Myers,et al.  Robust declassification , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[4]  John McLean,et al.  Reasoning About Security Models , 1987, 1987 IEEE Symposium on Security and Privacy.

[5]  José Meseguer,et al.  Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.

[6]  Carla Piazza,et al.  Modelling downgrading in information flow security , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..

[7]  Stephen Chong,et al.  Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.

[8]  Axel Schairer,et al.  Verified Formal Security Models for Multiapplicative Smart Cards , 2002, J. Comput. Secur..

[9]  J. Thomas Haigh,et al.  Extending The Non-Interference Version Of MLS For Sat , 1987, 1986 IEEE Symposium on Security and Privacy.

[10]  John Rushby A Separation Kernel Formal Security Policy in PVS , 2004 .

[11]  Myla Archer,et al.  Formal specification and verification of data separation in a separation kernel for an embedded system , 2006, CCS '06.

[12]  John M. Rushby,et al.  Design and verification of secure systems , 1981, SOSP.

[13]  F. Javier Thayer,et al.  Security and the Composition of Machines , 1988, CSFW.

[14]  Heiko Mantel,et al.  Information Flow Control and Applications - Bridging a Gap , 2001, FME.

[15]  Stephen Chong,et al.  Using Architecture to Reason about Information Security , 2014, TSEC.

[16]  A. W. Roscoe,et al.  What is intransitive noninterference? , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.

[17]  Birgit Pfitzmann,et al.  Intransitive non-interference for cryptographic purposes , 2003, 2003 Symposium on Security and Privacy, 2003..

[18]  Andrei Sabelfeld,et al.  Gradual Release: Unifying Declassification, Encryption and Key Release Policies , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[19]  A. Goldberg,et al.  Formal construction of the Mathematically Analyzed Separation Kernel , 2000, Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering.

[20]  William R. Bevier,et al.  A state-based approach to noninterference , 1994, Proceedings The Computer Security Foundations Workshop VII.

[21]  David Sands,et al.  Controlled Declassification Based on Intransitive Noninterference , 2004, APLAS.

[22]  Heiko Mantel,et al.  Possibilistic definitions of security-an assembly kit , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.

[23]  J. Todd Wittbold,et al.  Information flow in nondeterministic systems , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[24]  David Sands,et al.  Dimensions and principles of declassification , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).

[25]  John Mullins Nondeterministic Admissible Interference , 2000, J. Univers. Comput. Sci..

[26]  David von Oheimb Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage , 2004, ESORICS.

[27]  Ron van der Meyden,et al.  A comparison of semantic models for noninterference , 2006, Theor. Comput. Sci..

[28]  Leslie Lamport,et al.  Reaching Agreement in the Presence of Faults , 1980, JACM.

[29]  Eran Tromer,et al.  Noninterference for a Practical DIFC-Based Operating System , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[30]  Daryl McCullough,et al.  Noninterference and the composability of security properties , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[31]  Ronald Fagin,et al.  Reasoning about knowledge , 1995 .

[32]  J. Meseguer,et al.  Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.

[33]  David Clark,et al.  Non-Interference for Deterministic Interactive Programs , 2009, Formal Aspects in Security and Trust.

[34]  Peter Y. A. Ryan,et al.  Process algebra and non-interference , 2001 .

[35]  Andrew C. Myers,et al.  Security policies for downgrading , 2004, CCS '04.

[36]  Roberto Gorrieri,et al.  On Intransitive Non-interference in Some Models of Concurrency , 2011, FOSAD.

[37]  Henning Schnoor,et al.  The Complexity of Intransitive Noninterference , 2011, 2011 IEEE Symposium on Security and Privacy.