Information flow, distributed systems, and refinement, by example

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Non-interference is one of the foundational notions of security stretching back to Goguen and Meseguer [3]. Roughly, a set of activities is non-interfering with a set if any possible behavior at is compatible with anything that could have occurred at. One also speaks of “no information flow” from to in this case. Many hands further developed the idea and its variants (e.g. [12, 15]), which also flourished within the process calculus context [1, 2, 6, 13]. A.W. Roscoe contributed a characteristically distinctive idea to this discussion, in collaboration with J. Woodcock and L. Wulf. The idea was that a system is secure for flow from to when, after hiding behaviors at the source , the destination experiences the system as [8, 11]. In the CSP tradition, a process is deterministic if, after engaging in a sequence of events, it can refuse an event , then it always refuses the event after engaging in [9].

Cite

CITATION STYLE

APA

Guttman, J. D. (2017). Information flow, distributed systems, and refinement, by example. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10160, pp. 88–103). Springer Verlag. https://doi.org/10.1007/978-3-319-51046-0_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free