Non-interference through determinism*

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Non-Interference Through Determinism

The standard approach to the specification of a secure system is to present a (usually state-hased) abstract security model separately from the specification of the system's functional n:quirements, and establishing a correspondence between the two specifications. This complex treatment has resulted in development methods distinct from those usually advocated for general applications. We provid...

متن کامل

Non determinism through type isomorphism

Several non-deterministic extensions to the λ -calculus have been proposed, e.g. [6, 7, 10–12, 24]. In these approaches, the parallel composition (sometimes called the must-convergent parallel composition) is such that if r and s are two λ -terms, the term r+ s (also written r ‖ s) represents the computation that runs either r or s non-deterministically. It is common to consider in these approa...

متن کامل

Tiling-recognizable Two-dimensional Languages: from Non-determinism to Determinism through Unambiguity

Tiling recognizable two-dimensional languages, also known as REC, generalize recognizable string languages to two dimensions and share with them several theoretical properties. Nevertheless REC is not closed under complementation and the membership problem is NP-complete. This implies that this family REC is intrinsically non-deterministic. The natural and immediate definition of unambiguity co...

متن کامل

Preventing Intrusions through Non-Interference

The ability to prevent and to detect intrusions in computer systems is often heavily conditioned by having some knowledge of the security flaws of the system under analysis. Discover intrusions is particularly hard in concurrent systems, which contain several interactions among their components; suspicious interactions are usually studied manually by security experts which need to establish if ...

متن کامل

Non-Interference through Annotated Multisemantics

Non-interference can be de ned as a program property that give guaranties on the independence of speci c (public) outputs of a program from speci c (secret) inputs. The notion of non-interference does not depend on one particular execution of the program (unlike illegal memory access for example), but on its global behavior. To develop a certi ed system verifying information ows, such as non-in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Security

سال: 1996

ISSN: 1875-8924,0926-227X

DOI: 10.3233/jcs-1996-4103