Results 1 - 10
of
1,559
On the role of abstract non-interference in language-based security
- THIRD ASIAN SYMP. ON PROGRAMMING LANGUAGES AND SYSTEMS (APLAS ’05), VOLUME 3780 OF LECTURE NOTES IN COMPUTER SCIENCE
, 2005
"... Non-Interference in language based security, by explaining how it models both the weakening of attackers ’ observational capability, and the non-interference we model both attackers that can only observe properties of public data, and private properties that can or cannot flow. Moreover, we deepen t ..."
Abstract
-
Cited by 9 (3 self)
- Add to MetaCart
Non-Interference in language based security, by explaining how it models both the weakening of attackers ’ observational capability, and the non-interference we model both attackers that can only observe properties of public data, and private properties that can or cannot flow. Moreover, we deepen
Proving abstract non-interference
- Conf. of the European Association for Computer Science Logic, volume 3210 of LNCS
, 2004
"... Abstract. In this paper we introduce a compositional proof-system for certifying abstract non-interference in programming languages. Certifying abstract noninterference means proving that no unauthorized flow of information is observable by the attacker from confidential to public data. The properti ..."
Abstract
-
Cited by 9 (4 self)
- Add to MetaCart
Abstract. In this paper we introduce a compositional proof-system for certifying abstract non-interference in programming languages. Certifying abstract noninterference means proving that no unauthorized flow of information is observable by the attacker from confidential to public data
Timed abstract non-interference
- In Proc. of The International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS’05), Lecture Notes in Computer Science
, 2005
"... Abstract. In this paper, we introduce a timed notion of abstract non-interference. This is obtained by considering semantics which observe time elapsed in computations. Timing channels can be modeled in this way either by letting the attacker to observe time as a public variable or reckon the time e ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
Abstract. In this paper, we introduce a timed notion of abstract non-interference. This is obtained by considering semantics which observe time elapsed in computations. Timing channels can be modeled in this way either by letting the attacker to observe time as a public variable or reckon the time
Abstract Abstract Non-Interference Parameterizing Non-Interference by Abstract Interpretation
"... In this paper we generalize the notion of non-interference making it parametric relatively to what an attacker can analyze about the input/output information flow. The idea is to consider attackers as data-flow analyzers, whose task is to reveal properties of confidential resources by analyzing publ ..."
Abstract
- Add to MetaCart
property of its semantics. This provides a comprehensive account of non-interference features for language-based security. We introduce systematic methods for extracting attackers from programs, providing domain-theoretic characterizations of the most precise attackers which cannot violate the security
Approximate Non-Interference
- JOURNAL OF COMPUTER SECURITY
, 2002
"... We address the problem of characterising the security of a program against unauthorised information flows. Classical approaches are based on non-interference models which depend ultimately on the notion of process equivalence. In these models confidentiality is an absolute property stating the absen ..."
Abstract
-
Cited by 104 (11 self)
- Add to MetaCart
We address the problem of characterising the security of a program against unauthorised information flows. Classical approaches are based on non-interference models which depend ultimately on the notion of process equivalence. In these models confidentiality is an absolute property stating
The Determinants of Credit Spread Changes.
- Journal of Finance
, 2001
"... ABSTRACT Using dealer's quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression are ..."
Abstract
-
Cited by 422 (2 self)
- Add to MetaCart
rates, r 10 t . To capture potential non-linear effects due to convexity, we also include the squared level of the term structure, (r 10 t ) 2 . Slope of Yield Curve We define the slope of the yield curve as the difference between Datastream's 10-year and 2-year Benchmark Treasury yields, slope
Non-interference for deterministic interactive programs
- In Formal Aspects of Security and Trust: FAST 2008, Revised Selected Papers
, 2009
"... Abstract. We consider the problem of defining an appropriate notion of non-interference (NI) for deterministic interactive programs. Previous work on the security of interactive programs by O’Neill, Clarkson and Chong (CSFW 2006) builds on earlier ideas due to Wittbold and Johnson (Symposium on Secu ..."
Abstract
-
Cited by 25 (0 self)
- Add to MetaCart
Abstract. We consider the problem of defining an appropriate notion of non-interference (NI) for deterministic interactive programs. Previous work on the security of interactive programs by O’Neill, Clarkson and Chong (CSFW 2006) builds on earlier ideas due to Wittbold and Johnson (Symposium
Non-interference through Determinism
- Journal of Computer Security
, 1994
"... The standard approach to the specification of a secure system is to present a (usually state-hased) abstract security model separately from the specification of the system's functional n:quirements, and establishing a correspondence between the two specifications. This complex treatment has res ..."
Abstract
-
Cited by 76 (16 self)
- Add to MetaCart
The standard approach to the specification of a secure system is to present a (usually state-hased) abstract security model separately from the specification of the system's functional n:quirements, and establishing a correspondence between the two specifications. This complex treatment has
Abstract Certification of Global Non-Interference in Rewriting Logic ⋆
"... Abstract. Non–interference is a semantic program property that assigns confidentiality levels to data objects and prevents illicit information flows from occurring from high to low security levels. In this paper, we present a novel security model for global non–interference which approximates non–in ..."
Abstract
-
Cited by 6 (1 self)
- Add to MetaCart
Abstract. Non–interference is a semantic program property that assigns confidentiality levels to data objects and prevents illicit information flows from occurring from high to low security levels. In this paper, we present a novel security model for global non–interference which approximates non–interference
Computational probabilistic non-interference
- In Proc. 7th European Symposium on Research in Computer Security (ESORICS
, 2002
"... Abstract. In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definition of probabilistic non-interference in reactive systems which includes a computational case. This case is esse ..."
Abstract
-
Cited by 27 (9 self)
- Add to MetaCart
Abstract. In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definition of probabilistic non-interference in reactive systems which includes a computational case. This case
Results 1 - 10
of
1,559