Characterizing intransitive noninterference for 3-domain security policies with observability
暂无分享,去创建一个
Nejib Ben Hadj-Alouane | Feng Lin | John Mullins | Stéphane Lafrance | Mohamed Moez Yeddes | F. Lin | N. Hadj-Alouane | J. Mullins | M. Yeddes | S. Lafrance
[1] Jan C. WillemsInstitute. The Computational Complexity of Decentralized Discrete-Event Control Problems , 1993 .
[2] John Rushby,et al. Noninterference, Transitivity, and Channel-Control Security Policies 1 , 2005 .
[3] Peter Y. A. Ryan,et al. Process algebra and non-interference , 2001 .
[4] Cynthia E. Irvine. A multilevel file system for high assurance , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[5] Nejib Ben Hadj-Alouane,et al. Characterizing Intransitive Non-Interference in Security Policies with Observability , 2004 .
[6] John Mullins,et al. Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols , 2003, Inf. Softw. Technol..
[7] R.,et al. A CLASSIFICATION OF SECURITY PROPERTIES FOR PROCESS ALGEBRAS 1 , 1994 .
[8] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[9] John McLean,et al. A General Theory of Composition for a Class of "Possibilistic'' Properties , 1996, IEEE Trans. Software Eng..
[10] John Mullins. Nondeterministic Admissible Interference , 2000, J. Univers. Comput. Sci..
[11] Peter Y. A. Ryan,et al. Process algebra and non-interference , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[12] Walter Murray Wonham,et al. On observability of discrete-event systems , 1988, Inf. Sci..
[13] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[14] G. Boudol,et al. Notes on Algebraic Calculi of Processes , 1989, Logics and Models of Concurrent Systems.
[15] P. Ramadge,et al. Supervisory control of a class of discrete event processes , 1987 .
[16] A. W. Roscoe,et al. What is intransitive noninterference? , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.