Calculated Secure Processes

نویسندگان

  • Michael J. Banks
  • Jeremy L. Jacob
چکیده

This paper introduces a versatile operator for modifying CSP processes to satisfy particular information flow security requirements. We present and justify an algebraic semantics for this operator, which allows us to derive secure processes from (potentially) insecure processes in a calculational style. Moreover, the operator simplifies the task of verifying the security of processes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Transdiagnosistic processes or Diagnostic Based of reinforcement sensitivity and attachment styles in patients with addiction and binge eating disorder

The aim of this study was to investigate the transdiagnosistic processes of reinforcement sensitivity and attachment styles in patients with addiction and binge eating disorder.  The present study was describes causal comparison, the statistical population included all people with binge eating disorder who referred to counseling centers as well as all individuals with addiction of counseling ce...

متن کامل

Designing Secure Business Processes Through Secure Activity Resource Coordination (SARC)

Business processes enable organizations to achieve business goals. Organizations require that their business processes exchange information in a secure environment. Access control mechanisms must be incorporated into the analysis, modeling, and design of business processes to prevent unauthorized access to information resources, to provide non-repudiation mechanisms, and to allow for segregatio...

متن کامل

An Efficient Cooperative Mac Protocol for Wireless Lan

In cooperative communication in wireless networks, selection of best relay node is an important task. And provide secure transmission is also a challenging work. Our proposed protocol provides a new approach for relay selection and secure transmission in cooperative network for wireless network. Secure and efficient relays are selected on the basis of RPI table that maintain RPI points which is...

متن کامل

A risk model for cloud processes

Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification...

متن کامل

Semantic Information Assurance for Secure Distributed Knowledge Management: A Business Process Perspective By: Rahul Singh and Al F. Salam Singh, Rahul and Salam, A. F. "Semantic Information Assurance for Secure Distributed Knowledge Management: A Business Process Perspective" IEEE Transactions

Secure knowledge management for eBusiness processes that span multiple organizations requires intraorganizational and interorganizational perspectives on security and access control issues. There is paucity in research on information assurance of distributed interorganizational eBusiness processes from a business process perspective. This paper presents a framework for secure semantic eBusiness...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010