• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 28
Next 10 →

Noninterference for Free ⇤

by William J. Bowman, Amal Ahmed
"... The dependency core calculus (DCC) is a framework for studying a variety of dependency analyses (e.g., secure information flow). The key property provided by DCC is noninterference, which guarantees that a low-level observer (attacker) cannot distinguish high-level (protected) computations. The proo ..."
Abstract - Add to MetaCart
The dependency core calculus (DCC) is a framework for studying a variety of dependency analyses (e.g., secure information flow). The key property provided by DCC is noninterference, which guarantees that a low-level observer (attacker) cannot distinguish high-level (protected) computations

Permission accounting in separation logic

by Richard Bornat, Cristiano Calcagno, Matthew Parkinson - In POPL , 2005
"... A lightweight logical approach to race-free sharing of heap storage between concurrent threads is described, based on the notion of permission to access. Transfer of permission between threads, subdivision and combination of permission is discussed. The roots of the approach are in Boyland’s [3] dem ..."
Abstract - Cited by 191 (24 self) - Add to MetaCart
A lightweight logical approach to race-free sharing of heap storage between concurrent threads is described, based on the notion of permission to access. Transfer of permission between threads, subdivision and combination of permission is discussed. The roots of the approach are in Boyland’s [3

Information Flow Inference For Free

by Franois Pottier, Sylvain Conchon - In Proc. 5th ACM SIGPLAN International Conference on Functional Programming (ICFP , 2000
"... This paper shows how to systematically extend an arbitrary type system with dependency information, and how soundness and non-interference proofs for the new system may rely upon, rather than duplicate, the soundness proof of the original system. This allows enriching virtually any of the type syste ..."
Abstract - Cited by 77 (2 self) - Add to MetaCart
This paper shows how to systematically extend an arbitrary type system with dependency information, and how soundness and non-interference proofs for the new system may rely upon, rather than duplicate, the soundness proof of the original system. This allows enriching virtually any of the type

AUTOMATED TOOL-ORIENTATION DETERMINATIONS FOR 4-AXIS NON-GOUGE, NON-INTERFERENCE MILLING OF AXIAL-FLOW COMPRESSORS AIRFOILS

by Zezhong C Chen , Gang Liu
"... ABSTRACT As important components of gas turbine engines, axialflow compressors have been improved with a more complex and accurate airfoil design to meet high aerodynamic requirements; specifically, the pressure and suction surfaces of the airfoils (or blades) are now represented with free-form sur ..."
Abstract - Add to MetaCart
ABSTRACT As important components of gas turbine engines, axialflow compressors have been improved with a more complex and accurate airfoil design to meet high aerodynamic requirements; specifically, the pressure and suction surfaces of the airfoils (or blades) are now represented with free

Singletrack: A dynamic determinism checker for multithreaded programs

by Caitlin Sadowski, Stephen N. Freund, Cormac Flanagan - In European Symposium on Programming (ESOP
"... Abstract. Multithreaded programs are prone to errors caused by unintended interference between concurrent threads. This paper focuses on verifying that deterministically-parallel code is free of such thread interference errors. Deterministically-parallel code may create and use new threads, via fork ..."
Abstract - Cited by 37 (9 self) - Add to MetaCart
Abstract. Multithreaded programs are prone to errors caused by unintended interference between concurrent threads. This paper focuses on verifying that deterministically-parallel code is free of such thread interference errors. Deterministically-parallel code may create and use new threads, via

Translating Dependency into Parametricity

by Stephen Tse, Steve Zdancewic - In: ACM International Conference on Functional Programming
"... Abadi et al. introduced the dependency core calculus (DCC) as a unifying framework to study many important program analyses such as binding time, information flow, slicing, and function call tracking. DCC uses a lattice of monads and a nonstandard typing rule for their associated bind operations to ..."
Abstract - Cited by 32 (3 self) - Add to MetaCart
-Reynolds polymorphic lambda calculus (System F). We encode the recursion-free fragment of DCC into F via a type-directed translation. Our main theoretical result is that, following from the correctness of the translation, the parametricity theorem for F implies the noninterference theorem for DCC. In addition

Foundational Ethics of the Health Care System: The Moral and Practical Superiority of Free Market Reforms

by Robert M. Sade
"... Proposed solutions to the problems of this country’s health care sys-tem range along a spectrum from central planning to free market. Central planners and free market advocates provide various ethical justifi cations for the policies they propose. The crucial fl aw in the philosophical rationale of ..."
Abstract - Add to MetaCart
of central planning is failure to distinguish between normative and metanormative principles, which leads to mistaken understanding of the nature of rights. Natural rights, based on the principle of noninterference, provide the link between individual morality and social order. Free markets, the practical

A Less Elementary Tutorial for the PVS Specification and Verification System

by Rushby And Stringer-Calvert, J. M. Rushby, D. W. J. Stringer-calvert - Computer Science , 1996
"... PVS is a verification system that provides a specification language integrated with support tools and a theorem-prover. It has been used at SRI and elsewhere to perform verifications of several significant algorithms (primarily for faulttolerance) and large hardware designs. This tutorial introd ..."
Abstract - Cited by 24 (1 self) - Add to MetaCart
the noninterference formulation of security to introduce theorem-proving strategies for induction that cannot be demonstrated in the framework of Ricky Butler's example. Using the more powerful strategies of PVS to automate easy proofs (and the easy parts of hard proofs) frees users to concentrate on truly

Composing and decomposing systems under security properties

by A. W. Roscoe, L. Wulf - In Proc. IEEE Computer Security Foundations Workshop , 1995
"... We investigate the formal relationship between separability of pro-cesses and the types of non-interference properties they enjoy. Though intuitively appealing, separability { the ability to dene a process as a parallel composition of disjoint components { alone cannot adequately prove the absence o ..."
Abstract - Cited by 11 (2 self) - Add to MetaCart
We investigate the formal relationship between separability of pro-cesses and the types of non-interference properties they enjoy. Though intuitively appealing, separability { the ability to dene a process as a parallel composition of disjoint components { alone cannot adequately prove the absence

Quantitative Information Flow – Verification Hardness and Possibilities

by Hirotoshi Yasuoka, Tachio Terauchi
"... Abstract—Researchers have proposed formal definitions of quantitative information flow based on information theoretic notions such as the Shannon entropy, the min entropy, the guessing entropy, and channel capacity. This paper investigates the hardness and possibilities of precisely checking and inf ..."
Abstract - Cited by 15 (0 self) - Add to MetaCart
applied to precisely checking non-interference. We also show a complexity theoretic gap with non-interference by proving that, for loop-free boolean programs whose non-interference is coNP-complete, the comparison problem is #P-hard for all of the definitions. For positive results, we show
Next 10 →
Results 1 - 10 of 28
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University