A state-based approach to noninterference

We outline an alternative approach to modeling noninterference-style security policies using a state-based model (as opposed to an event-based or i/o-based model). We believe that this approach provides a richer, more intuitive formalism for security modeling than the event-based approach and provid...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Bevier, W.R., Young, W.D.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 21
container_issue
container_start_page 11
container_title
container_volume
creator Bevier, W.R.
Young, W.D.
description We outline an alternative approach to modeling noninterference-style security policies using a state-based model (as opposed to an event-based or i/o-based model). We believe that this approach provides a richer, more intuitive formalism for security modeling than the event-based approach and provides a link to other current research in specification and verification of concurrent and distributed systems. We describe the state-based approach for deterministic and non-deterministic systems with both transitive and intransitive security policies.< >
doi_str_mv 10.1109/CSFW.1994.315951
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_315951</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>315951</ieee_id><sourcerecordid>315951</sourcerecordid><originalsourceid>FETCH-LOGICAL-i89t-a54c6d6cf24204fdfcc47f70a31280840e3e60cd8ac73a6ec0be385a7d5dfb333</originalsourceid><addsrcrecordid>eNotjztLxEAURgcf4LKmF6u0FhPv5M6zXIKrwoKFC5bLzcwdjGgSkjT-ewPrab7u8B0h7hRUSkF4bN73H5UKQVeoTDDqQmxqdE4abcKlKILz4JW3tkaAK7FRYFHaAHAjinn-ghVj_GraiIddOS-0sGxp5lTSOE4Dxc9yGcp-6Lt-4SnzxH3kW3Gd6Xvm4n-34rh_OjYv8vD2_NrsDrLzYZFkdLTJxlzrGnROOUbtsgNCVa-nNDCyhZg8RYdkOULL6A25ZFJuEXEr7s_ajplP49T90PR7OmfiH1k1Q3g</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A state-based approach to noninterference</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Bevier, W.R. ; Young, W.D.</creator><creatorcontrib>Bevier, W.R. ; Young, W.D.</creatorcontrib><description>We outline an alternative approach to modeling noninterference-style security policies using a state-based model (as opposed to an event-based or i/o-based model). We believe that this approach provides a richer, more intuitive formalism for security modeling than the event-based approach and provides a link to other current research in specification and verification of concurrent and distributed systems. We describe the state-based approach for deterministic and non-deterministic systems with both transitive and intransitive security policies.&lt; &gt;</description><identifier>ISSN: 1063-6900</identifier><identifier>ISBN: 9780818662300</identifier><identifier>ISBN: 0818662301</identifier><identifier>EISSN: 2377-5459</identifier><identifier>DOI: 10.1109/CSFW.1994.315951</identifier><language>eng</language><publisher>IEEE Comput. Soc. Press</publisher><subject>Carbon capture and storage ; Computational modeling ; Computer security ; Interference constraints ; Interleaved codes ; Logic</subject><ispartof>Proceedings The Computer Security Foundations Workshop VII, 1994, p.11-21</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/315951$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/315951$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Bevier, W.R.</creatorcontrib><creatorcontrib>Young, W.D.</creatorcontrib><title>A state-based approach to noninterference</title><title>Proceedings The Computer Security Foundations Workshop VII</title><addtitle>CSFW</addtitle><description>We outline an alternative approach to modeling noninterference-style security policies using a state-based model (as opposed to an event-based or i/o-based model). We believe that this approach provides a richer, more intuitive formalism for security modeling than the event-based approach and provides a link to other current research in specification and verification of concurrent and distributed systems. We describe the state-based approach for deterministic and non-deterministic systems with both transitive and intransitive security policies.&lt; &gt;</description><subject>Carbon capture and storage</subject><subject>Computational modeling</subject><subject>Computer security</subject><subject>Interference constraints</subject><subject>Interleaved codes</subject><subject>Logic</subject><issn>1063-6900</issn><issn>2377-5459</issn><isbn>9780818662300</isbn><isbn>0818662301</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>1994</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjztLxEAURgcf4LKmF6u0FhPv5M6zXIKrwoKFC5bLzcwdjGgSkjT-ewPrab7u8B0h7hRUSkF4bN73H5UKQVeoTDDqQmxqdE4abcKlKILz4JW3tkaAK7FRYFHaAHAjinn-ghVj_GraiIddOS-0sGxp5lTSOE4Dxc9yGcp-6Lt-4SnzxH3kW3Gd6Xvm4n-34rh_OjYv8vD2_NrsDrLzYZFkdLTJxlzrGnROOUbtsgNCVa-nNDCyhZg8RYdkOULL6A25ZFJuEXEr7s_ajplP49T90PR7OmfiH1k1Q3g</recordid><startdate>1994</startdate><enddate>1994</enddate><creator>Bevier, W.R.</creator><creator>Young, W.D.</creator><general>IEEE Comput. Soc. Press</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>1994</creationdate><title>A state-based approach to noninterference</title><author>Bevier, W.R. ; Young, W.D.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i89t-a54c6d6cf24204fdfcc47f70a31280840e3e60cd8ac73a6ec0be385a7d5dfb333</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>1994</creationdate><topic>Carbon capture and storage</topic><topic>Computational modeling</topic><topic>Computer security</topic><topic>Interference constraints</topic><topic>Interleaved codes</topic><topic>Logic</topic><toplevel>online_resources</toplevel><creatorcontrib>Bevier, W.R.</creatorcontrib><creatorcontrib>Young, W.D.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bevier, W.R.</au><au>Young, W.D.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A state-based approach to noninterference</atitle><btitle>Proceedings The Computer Security Foundations Workshop VII</btitle><stitle>CSFW</stitle><date>1994</date><risdate>1994</risdate><spage>11</spage><epage>21</epage><pages>11-21</pages><issn>1063-6900</issn><eissn>2377-5459</eissn><isbn>9780818662300</isbn><isbn>0818662301</isbn><abstract>We outline an alternative approach to modeling noninterference-style security policies using a state-based model (as opposed to an event-based or i/o-based model). We believe that this approach provides a richer, more intuitive formalism for security modeling than the event-based approach and provides a link to other current research in specification and verification of concurrent and distributed systems. We describe the state-based approach for deterministic and non-deterministic systems with both transitive and intransitive security policies.&lt; &gt;</abstract><pub>IEEE Comput. Soc. Press</pub><doi>10.1109/CSFW.1994.315951</doi><tpages>11</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1063-6900
ispartof Proceedings The Computer Security Foundations Workshop VII, 1994, p.11-21
issn 1063-6900
2377-5459
language eng
recordid cdi_ieee_primary_315951
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Carbon capture and storage
Computational modeling
Computer security
Interference constraints
Interleaved codes
Logic
title A state-based approach to noninterference
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T20%3A27%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20state-based%20approach%20to%20noninterference&rft.btitle=Proceedings%20The%20Computer%20Security%20Foundations%20Workshop%20VII&rft.au=Bevier,%20W.R.&rft.date=1994&rft.spage=11&rft.epage=21&rft.pages=11-21&rft.issn=1063-6900&rft.eissn=2377-5459&rft.isbn=9780818662300&rft.isbn_list=0818662301&rft_id=info:doi/10.1109/CSFW.1994.315951&rft_dat=%3Cieee_6IE%3E315951%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=315951&rfr_iscdi=true