Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
This paper presents a new model for controlling information flow in systems with mutual distrust and decentralized authority. The model allows users to share information with dis...
Abstract. We revisit the classical notion of noninterference for statebased systems, as presented by Rushby in 1992. We strengthen his results in several ways, in particular clarif...
This paper proposes a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-b...