What, indeed, is intransitive noninterference?
暂无分享,去创建一个
[1] Henning Schnoor,et al. Dynamic Noninterference: Consistent Policies, Characterizations and Verification , 2012, ArXiv.
[2] Stephen Chong,et al. Deriving epistemic conclusions from agent architecture , 2009, TARK '09.
[3] Andrew C. Myers,et al. Robust declassification , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[4] John McLean,et al. Reasoning About Security Models , 1987, 1987 IEEE Symposium on Security and Privacy.
[5] José Meseguer,et al. Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.
[6] Carla Piazza,et al. Modelling downgrading in information flow security , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[7] Stephen Chong,et al. Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[8] Axel Schairer,et al. Verified Formal Security Models for Multiapplicative Smart Cards , 2002, J. Comput. Secur..
[9] J. Thomas Haigh,et al. Extending The Non-Interference Version Of MLS For Sat , 1987, 1986 IEEE Symposium on Security and Privacy.
[10] John Rushby. A Separation Kernel Formal Security Policy in PVS , 2004 .
[11] Myla Archer,et al. Formal specification and verification of data separation in a separation kernel for an embedded system , 2006, CCS '06.
[12] John M. Rushby,et al. Design and verification of secure systems , 1981, SOSP.
[13] F. Javier Thayer,et al. Security and the Composition of Machines , 1988, CSFW.
[14] Heiko Mantel,et al. Information Flow Control and Applications - Bridging a Gap , 2001, FME.
[15] Stephen Chong,et al. Using Architecture to Reason about Information Security , 2014, TSEC.
[16] A. W. Roscoe,et al. What is intransitive noninterference? , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[17] Birgit Pfitzmann,et al. Intransitive non-interference for cryptographic purposes , 2003, 2003 Symposium on Security and Privacy, 2003..
[18] Andrei Sabelfeld,et al. Gradual Release: Unifying Declassification, Encryption and Key Release Policies , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[19] A. Goldberg,et al. Formal construction of the Mathematically Analyzed Separation Kernel , 2000, Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering.
[20] William R. Bevier,et al. A state-based approach to noninterference , 1994, Proceedings The Computer Security Foundations Workshop VII.
[21] David Sands,et al. Controlled Declassification Based on Intransitive Noninterference , 2004, APLAS.
[22] Heiko Mantel,et al. Possibilistic definitions of security-an assembly kit , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[23] J. Todd Wittbold,et al. Information flow in nondeterministic systems , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[24] David Sands,et al. Dimensions and principles of declassification , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).
[25] John Mullins. Nondeterministic Admissible Interference , 2000, J. Univers. Comput. Sci..
[26] David von Oheimb. Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage , 2004, ESORICS.
[27] Ron van der Meyden,et al. A comparison of semantic models for noninterference , 2006, Theor. Comput. Sci..
[28] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[29] Eran Tromer,et al. Noninterference for a Practical DIFC-Based Operating System , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[30] Daryl McCullough,et al. Noninterference and the composability of security properties , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[31] Ronald Fagin,et al. Reasoning about knowledge , 1995 .
[32] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[33] David Clark,et al. Non-Interference for Deterministic Interactive Programs , 2009, Formal Aspects in Security and Trust.
[34] Peter Y. A. Ryan,et al. Process algebra and non-interference , 2001 .
[35] Andrew C. Myers,et al. Security policies for downgrading , 2004, CCS '04.
[36] Roberto Gorrieri,et al. On Intransitive Non-interference in Some Models of Concurrency , 2011, FOSAD.
[37] Henning Schnoor,et al. The Complexity of Intransitive Noninterference , 2011, 2011 IEEE Symposium on Security and Privacy.