Refinement operators and information flow security
- 1 January 2003
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
The systematic development of complex systems usually relies on a stepwise refinement procedure from an abstract specification to a more concrete one that can finally be implemented. The use of refinement operators preserving system properties is clearly essential since it avoids properties to be re-investigated at each development step. In this paper, we formalize the notion of refinement for processes described as terms of the security process algebra (SPA). We consider several information flow security properties and provide sufficient conditions under which our refinement operators preserve such security properties. Finally, we study how refinements can be composed still preserving the security of the system.Keywords
This publication has 16 references indexed in Scilit:
- On the composition of secure systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Quantifying information flowPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- On the derivation of secure componentsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Comparing two information flow security propertiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A general theory of composition for trace sets closed under selective interleaving functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Computing simulations on finite and infinite graphsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Preserving information flow properties under refinementPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Classification of Security PropertiesPublished by Springer Nature ,2001
- A general theory of composition for a class of "possibilistic" propertiesIEEE Transactions on Software Engineering, 1996
- A Classification of Security Properties for Process Algebras1Journal of Computer Security, 1995