A Classification of Security Properties for Process Algebras

作者: Riccardo Focardi , Roberto Gorrieri

DOI: 10.3233/JCS-1994/1995-3103

关键词:

摘要: … for many process algebras, eg CCS. As a by-product, we provide a process algebra similar to … , taking into account also the additional property of input totality, which can influence this …

参考文章(23)
Mark E. Nadel, Joshua D. Guttman, What Needs Securing. ieee computer security foundations symposium. pp. 34- 57 ,(1988)
F. Javier Thayer, Dale M. Johnson, Security and the Composition of Machines. ieee computer security foundations symposium. pp. 72- 89 ,(1988)
Daryl McCullough, Covert Channels and Degrees of Insecurity. ieee computer security foundations symposium. pp. 1- 33 ,(1988)
Colin O'Halloran, A Calculus of Information Flow. european symposium on research in computer security. pp. 147- 159 ,(1990)
R. Gorrieri, R. Focardi, An Information Flow Security Property for CCS University of Bologna. ,(1993)
Pierre Bieber, Frédéric Cuppens, A Logical View of Secure Dependencies Journal of Computer Security. ,vol. 1, pp. 99- 129 ,(1992) , 10.3233/JCS-1992-1105
Rance Cleaveland, Joachim Parrow, Bernhard Steffen, The concurrency workbench ACM Transactions on Programming Languages and Systems. ,vol. 15, pp. 36- 72 ,(1993) , 10.1145/151646.151648
Roberto Gorrieri, Marco Roccetti, Enrico Stancampiano, A Theory of Processes with Durational Actions algebraic methodology and software technology. ,vol. 140, pp. 73- 94 ,(1995) , 10.1016/0304-3975(94)00205-W
J. A. Goguen, J. Meseguer, Security Policies and Security Models ieee symposium on security and privacy. pp. 11- 11 ,(1982) , 10.1109/SP.1982.10014
Robert M. Keller, Formal verification of parallel programs Communications of The ACM. ,vol. 19, pp. 371- 384 ,(1976) , 10.1145/360248.360251