Preservation of probabilistic information flow under refinement
نویسندگان
چکیده
منابع مشابه
Preserving Information Flow Properties under Refinement
In a stepwise development process, it is essential that system properties that have been already investigated in some phase need not be re-investigated in later phases. In formal developments, this corresponds to the requirement that properties are preserved under refinement. While safety and liveness properties are indeed preserved under most standard forms of refinement, it is well known that...
متن کاملPreservation of Policy Adherence under Refinement
Policy-basedmanagement is an approach to the management of sys-tems with respect to issues such as security, access control and trustby the enforcement of policy rules. This paper addresses the problemof integrating the requirements imposed by a policy with the systemdevelopment process. In order to take a policy specification into ac-count in the development of a system spe...
متن کاملMaintaining Information Flow Security Under Refinement and Transformation
We address the problem of maintaining information flow security under refinement and transformation. To this end we define a schema for the specification of secure information flow properties and show that all security properties defined in the schema are preserved by a notion of refinement. Refinement is a process that requires human guidance and is in general not subject for automation. A tra...
متن کاملProbabilistic Information Flow Security
A formal model for description of probabilistic timing attacks is presented and studied. It is based on a probabilistic timed process algebra, on observations (mappings which make visible only a part of system behavior) and on an information flow. The resulting security properties are studied and compared with other security concepts.
متن کاملInformation Flow Is Linear Refinement of Constancy
Detecting information flows inside a program is useful to check non-interference of program variables, an important aspect of software security. Information flows have been computed in the past by using abstract interpretation over an abstract domain IF which expresses sets of flows. In this paper we reconstruct IF as the linear refinement C → C of a basic domain C expressing constancy of progr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information and Computation
سال: 2008
ISSN: 0890-5401
DOI: 10.1016/j.ic.2007.07.008