منابع مشابه
Non-Interference Through Determinism
The standard approach to the specification of a secure system is to present a (usually state-hased) abstract security model separately from the specification of the system's functional n:quirements, and establishing a correspondence between the two specifications. This complex treatment has resulted in development methods distinct from those usually advocated for general applications. We provid...
متن کاملNon determinism through type isomorphism
Several non-deterministic extensions to the λ -calculus have been proposed, e.g. [6, 7, 10–12, 24]. In these approaches, the parallel composition (sometimes called the must-convergent parallel composition) is such that if r and s are two λ -terms, the term r+ s (also written r ‖ s) represents the computation that runs either r or s non-deterministically. It is common to consider in these approa...
متن کاملTiling-recognizable Two-dimensional Languages: from Non-determinism to Determinism through Unambiguity
Tiling recognizable two-dimensional languages, also known as REC, generalize recognizable string languages to two dimensions and share with them several theoretical properties. Nevertheless REC is not closed under complementation and the membership problem is NP-complete. This implies that this family REC is intrinsically non-deterministic. The natural and immediate definition of unambiguity co...
متن کاملPreventing Intrusions through Non-Interference
The ability to prevent and to detect intrusions in computer systems is often heavily conditioned by having some knowledge of the security flaws of the system under analysis. Discover intrusions is particularly hard in concurrent systems, which contain several interactions among their components; suspicious interactions are usually studied manually by security experts which need to establish if ...
متن کاملNon-Interference through Annotated Multisemantics
Non-interference can be de ned as a program property that give guaranties on the independence of speci c (public) outputs of a program from speci c (secret) inputs. The notion of non-interference does not depend on one particular execution of the program (unlike illegal memory access for example), but on its global behavior. To develop a certi ed system verifying information ows, such as non-in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Security
سال: 1996
ISSN: 1875-8924,0926-227X
DOI: 10.3233/jcs-1996-4103