Noninterference

Results: 30



#Item
21

Dynamic Security Labels and Noninterference Lantian Zheng Andrew C. Myers Computer Science Department Cornell University, Ithaca, NY 14853 {zlt,andru}@cs.cornell.edu

Add to Reading List

Source URL: tianyuan.org

Language: English - Date: 2008-05-10 23:29:39
    22Cryptography / Computer security / Language-based security / KeY / Ciphertext indistinguishability / Universal composability

    A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs Ralf Küsters∗ , Tomasz Truderung∗ , Bernhard Beckert† , Daniel Bruns† , Jürgen Graf† and Chris

    Add to Reading List

    Source URL: grsrd.uni.lu

    Language: English - Date: 2013-04-09 08:10:38
    23

    2011 IEEE Symposium on Security and Privacy The Complexity of Intransitive Noninterference Sebastian Eggert∗ , Ron van der Meyden† , Henning Schnoor∗ , Thomas Wilke∗ ∗ Institut f¨ ur Informatik, Kiel Universi

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2011-04-10 18:06:56
      24Ad hoc / Delegation / Object-oriented programming / Prototype-based programming

      Noninterference Analysis of Delegation Subterfuge Simon Foley Hongbin Zhou June 30, 2006

      Add to Reading List

      Source URL: www.cs.ucc.ie

      Language: English - Date: 2006-06-30 07:31:02
      25Applied mathematics / Formal verification / Logic in computer science / KeY / Abstract interpretation / Modal logic / Predicate transformer semantics / Theoretical computer science / Formal methods / Logic

      A Hybrid Approach for Proving Noninterference of Java Programs Ralf Küsters∗ , Tomasz Truderung∗ , Bernhard Beckert† , Daniel Bruns† , Michael Kirsten† and Martin Mohr† ∗ University of Trier, Germany Email

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-05-07 09:31:03
      26Quantum complexity theory / Circuit complexity / NC / Valuation / Ch / PP / Activity / Entailment / Theoretical computer science / Computational complexity theory / Logic

      Reactive Noninterference Aaron Bohannon Benjamin C. Pierce Stephanie Weirich

      Add to Reading List

      Source URL: www.seas.upenn.edu

      Language: English - Date: 2014-07-10 05:47:04
      27Noninterference / Declassification / Quantitative analyst / Information / Information flow / Information theory

      Course outline 1.  Language-Based Security: motivation 2.  Language-Based Information-Flow Security: the big picture 3.  Dimensions and principles of declassification 4.  Dynamic vs. static security enforcement

      Add to Reading List

      Source URL: www.sti.uniurb.it

      Language: English - Date: 2014-09-11 02:40:15
      28Function / Microkernel / Calculus / State space / Linux kernel / Computer architecture / Mathematics / Software

      Noninterference for Operating System Kernels Toby Murray1,2 , Daniel Matichuk1 , Matthew Brassil1 , Peter Gammie1 and Gerwin Klein1,2 1 2

      Add to Reading List

      Source URL: ssrg.nicta.com.au

      Language: English - Date: 2013-10-20 22:09:39
      29Stack machines / Stack / Subroutine / Call stack / Software engineering / Computer programming / Computing

      Testing Noninterference, Quickly C˘at˘alin Hrit¸cu1 John Hughes2 Benjamin C. Pierce1

      Add to Reading List

      Source URL: www.crash-safe.org

      Language: English - Date: 2014-08-15 21:25:30
      30Process calculus / Abstraction / Computing / Computer science / Logic in computer science / Formal verification / Theoretical computer science

      Component-Oriented Verification of Noninterference Alessandro Aldini Marco Bernardo Dipartimento di Matematica, Informatica, Fisica e Chimica – Universit`

      Add to Reading List

      Source URL: www.sti.uniurb.it

      Language: English - Date: 2011-03-14 09:41:01
      UPDATE