On the composition of secure systems
- 25 August 2005
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 1, 88-101
- https://doi.org/10.1109/secpri.2002.1004364
Abstract
No abstract availableThis publication has 28 references indexed in Scilit:
- May Testing, Non-interference, and CompositionalityElectronic Notes in Theoretical Computer Science, 2001
- Information Flow Control and Applications — Bridging a Gap —Published by Springer Nature ,2001
- Secure Information Flow for Concurrent ProcessesPublished by Springer Nature ,2000
- Transforming out timing leaksPublished by Association for Computing Machinery (ACM) ,2000
- A core calculus of dependencyPublished by Association for Computing Machinery (ACM) ,1999
- A general theory of composition for a class of "possibilistic" propertiesIEEE Transactions on Software Engineering, 1996
- Conjoining specificationsACM Transactions on Programming Languages and Systems, 1995
- Trace-based network proof systemsACM Transactions on Programming Languages and Systems, 1992
- A hookup theorem for multilevel securityIEEE Transactions on Software Engineering, 1990
- Defining livenessInformation Processing Letters, 1985