Abstractions of non-interference security: probabilistic versus possibilistic
The Shadow Semantics (Morgan, Math Prog Construction, vol 4014, pp 359–378, 2006 ; Morgan, Sci Comput Program 74(8):629–653, 2009 ) is a possibilistic (qualitative) model for noninterference security. Subsequent work (McIver et al., Proceedings of the 37th international colloquium conference on Auto...
Gespeichert in:
| Veröffentlicht in: | Formal Aspects of Computing Jg. 26; H. 1; S. 169 - 194 |
|---|---|
| Hauptverfasser: | , , , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
London
Association for Computing Machinery (ACM)
01.01.2014
Springer London Association for Computing Machinery |
| Schlagworte: | |
| ISSN: | 0934-5043, 1433-299X |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | The Shadow Semantics (Morgan, Math Prog Construction, vol 4014, pp 359–378,
2006
; Morgan, Sci Comput Program 74(8):629–653,
2009
) is a possibilistic (qualitative) model for noninterference security. Subsequent work (McIver et al., Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II,
2010
) presents a similar but more general
quantitative
model that treats probabilistic information flow. Whilst the latter provides a framework to reason about quantitative security risks, that extra detail entails a significant overhead in the verification effort needed to achieve it. Our first contribution in this paper is to study the relationship between those two models (qualitative and quantitative) in order to understand when qualitative Shadow proofs can be “promoted” to quantitative versions, i.e. in a probabilistic context. In particular we identify a subset of the Shadow’s refinement theorems that, when interpreted in the quantitative model, still remain valid even in a context where a passive adversary may perform probabilistic analysis. To illustrate our technique we show how a semantic analysis together with a syntactic restriction on the protocol description, can be used so that purely qualitative reasoning can nevertheless verify probabilistic refinements for an important class of security protocols. We demonstrate the semantic analysis by implementing the Shadow semantics in Rodin, using its special-purpose refinement provers to generate (and discharge) the required proof obligations (Abrial et al., STTT 12(6):447–466,
2010
). We apply the technique to some small examples based on secure multi-party computations. |
|---|---|
| AbstractList | The Shadow Semantics (Morgan, Math Prog Construction, vol 4014, pp 359-378, 2006; Morgan, Sci Comput Program 74(8):629-653, 2009) is a possibilistic (qualitative) model for noninterference security. Subsequent work (McIver et al., Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II, 2010) presents a similar but more general quantitative model that treats probabilistic information flow. Whilst the latter provides a framework to reason about quantitative security risks, that extra detail entails a significant overhead in the verification effort needed to achieve it. Our first contribution in this paper is to study the relationship between those two models (qualitative and quantitative) in order to understand when qualitative Shadow proofs can be "promoted" to quantitative versions, i.e. in a probabilistic context. In particular we identify a subset of the Shadow's refinement theorems that, when interpreted in the quantitative model, still remain valid even in a context where a passive adversary may perform probabilistic analysis. To illustrate our technique we show how a semantic analysis together with a syntactic restriction on the protocol description, can be used so that purely qualitative reasoning can nevertheless verify probabilistic refinements for an important class of security protocols. We demonstrate the semantic analysis by implementing the Shadow semantics in Rodin, using its special-purpose refinement provers to generate (and discharge) the required proof obligations (Abrial et al., STTT 12(6):447-466, 2010). We apply the technique to some small examples based on secure multi-party computations. The Shadow Semantics (Morgan, Math Prog Construction, vol 4014, pp 359-378, 2006 ; Morgan, Sci Comput Program 74(8):629-653, 2009 ) is a possibilistic (qualitative) model for noninterference security. Subsequent work (McIver et al., Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II, 2010 ) presents a similar but more general quantitative model that treats probabilistic information flow. Whilst the latter provides a framework to reason about quantitative security risks, that extra detail entails a significant overhead in the verification effort needed to achieve it. Our first contribution in this paper is to study the relationship between those two models (qualitative and quantitative) in order to understand when qualitative Shadow proofs can be "promoted" to quantitative versions, i.e. in a probabilistic context. In particular we identify a subset of the Shadow's refinement theorems that, when interpreted in the quantitative model, still remain valid even in a context where a passive adversary may perform probabilistic analysis. To illustrate our technique we show how a semantic analysis together with a syntactic restriction on the protocol description, can be used so that purely qualitative reasoning can nevertheless verify probabilistic refinements for an important class of security protocols. We demonstrate the semantic analysis by implementing the Shadow semantics in Rodin, using its special-purpose refinement provers to generate (and discharge) the required proof obligations (Abrial et al., STTT 12(6):447-466, 2010 ). We apply the technique to some small examples based on secure multi-party computations.[PUBLICATION ABSTRACT] The Shadow Semantics (Morgan, Math Prog Construction, vol 4014, pp 359–378, 2006 ; Morgan, Sci Comput Program 74(8):629–653, 2009 ) is a possibilistic (qualitative) model for noninterference security. Subsequent work (McIver et al., Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II, 2010 ) presents a similar but more general quantitative model that treats probabilistic information flow. Whilst the latter provides a framework to reason about quantitative security risks, that extra detail entails a significant overhead in the verification effort needed to achieve it. Our first contribution in this paper is to study the relationship between those two models (qualitative and quantitative) in order to understand when qualitative Shadow proofs can be “promoted” to quantitative versions, i.e. in a probabilistic context. In particular we identify a subset of the Shadow’s refinement theorems that, when interpreted in the quantitative model, still remain valid even in a context where a passive adversary may perform probabilistic analysis. To illustrate our technique we show how a semantic analysis together with a syntactic restriction on the protocol description, can be used so that purely qualitative reasoning can nevertheless verify probabilistic refinements for an important class of security protocols. We demonstrate the semantic analysis by implementing the Shadow semantics in Rodin, using its special-purpose refinement provers to generate (and discharge) the required proof obligations (Abrial et al., STTT 12(6):447–466, 2010 ). We apply the technique to some small examples based on secure multi-party computations. |
| Author | Meinicke, Larissa Morgan, Carroll C. Hoang, Thai Son Sloane, Anthony McIver, Annabelle K. Susatyo, Enrico |
| Author_xml | – sequence: 1 fullname: Hoang, Thai Son – sequence: 2 orcidid: 0000-0002-2405-9838 fullname: McIver, Annabelle K. – sequence: 3 orcidid: 0000-0002-5272-820x fullname: Meinicke, Larissa – sequence: 4 fullname: Morgan, Carroll C. – sequence: 5 orcidid: 0000-0002-6802-7360 fullname: Sloane, Anthony – sequence: 6 fullname: Susatyo, Enrico |
| BackLink | https://cir.nii.ac.jp/crid/1872835442656685824$$DView record in CiNii |
| BookMark | eNp9kEFL5DAYhoO44DjrD_BW0IOXaJLvS9p4E9FVULzswt5Cmkkl0knHpBXm329KPSwevCQQnvflzXNMDuMQPSGnnF1yxuqrzBhXkjIuKBNQUzwgK44AVGj995CsmAakkiEckZOcQ8uACwWg5Io837R5TNaNYYi5GrqqVNMQR586n3x0vsreTSmM--tql4bWtqEPeQyu-vApT7naDXPj5-NP8qOzffYnn_ea_Lm_-337QJ9efj3e3jxRh0090tYJL3yHNdPoPDixUTWzGqRi2uoWOynBtgqlU5tNw62Dzmm5AcbBohAO1uRi6S2T3iefR7MN2fm-t9EPUzYcNQKXAE1Bz76gb8OUYllXqBqANYi8UPVCuVT-k3xnXBjtLKXICb3hzMymzWLaFNNmNm2wJPmX5C6FrU37bzNiyeTCxlef_tv0Teh8CcUQyrr55E0tGpCIQkmlGtkIhH--r5yQ |
| CODEN | FACME5 |
| CitedBy_id | crossref_primary_10_1515_phys_2019_0013 |
| Cites_doi | 10.1016/j.scico.2007.09.003 10.1145/293347.293350 10.1016/j.ic.2007.07.008 10.1007/978-1-4612-1674-2 10.1007/s10207-004-0039-7 10.1145/1008731.1008734 10.1007/BF00206326 10.1109/JSAC.2002.806121 10.1007/s10009-010-0145-y 10.1016/0167-6423(87)90011-6 10.1007/s00165-010-0164-1 10.1017/CBO9780511624162 10.1109/TIT.1983.1056650 10.1007/978-3-642-03466-4_3 10.1109/SECPRI.2001.924289 10.1007/3-540-45853-0_1 10.5555/1102016 10.1007/978-3-540-78663-4_25 10.1007/11766155_19 10.1007/978-3-642-14162-1_19 10.1109/CSFW.2001.930138 10.1145/168588.168596 10.1109/SP.1984.10019 10.1007/978-3-642-22670-0_34 10.1109/SECPRI.2001.924298 10.1016/S0167-6423(99)00024-6 10.1109/SFCS.2001.959888 10.1007/978-3-642-12459-4_8 10.1109/SFCS.1982.38 10.1007/11783596_21 10.1145/1315245.1315282 10.5555/353677.353681 10.1007/978-1-84882-912-1_12 10.1109/SEFM.2003.1236206 10.1007/978-3-642-12002-2_32 |
| ContentType | Journal Article |
| Copyright | British Computer Society 2012 British Computer Society 2014 |
| Copyright_xml | – notice: British Computer Society 2012 – notice: British Computer Society 2014 |
| DBID | RYH AAYXX CITATION 3V. 7SC 7XB 8AL 8AO 8FD 8FE 8FG 8FK ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L7M L~C L~D M0N P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U |
| DOI | 10.1007/s00165-012-0237-4 |
| DatabaseName | CiNii Complete CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central ProQuest Technology Collection ProQuest One ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection Proquest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic |
| DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Pharma Collection ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest Central (Alumni) ProQuest One Academic (New) |
| DatabaseTitleList | Computer and Information Systems Abstracts Computer Science Database CrossRef |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1433-299X |
| EndPage | 194 |
| ExternalDocumentID | 3170204061 10_1007_s00165_012_0237_4 |
| Genre | Feature |
| GroupedDBID | .86 .DC .VR 06D 0VY 1N0 203 29H 2J2 2JY 2KG 2LR 2~H 30V 4.4 408 409 40D 40E 5GY 67Z 6NX 8AO 8FE 8FG 8FW 8TC 95- 95. 95~ 96X AABHQ AAHNG AAIAL AAJKR AAKMM AALFJ AARTL AATVU AAWCG AAYIU AAYQN AAYTO ABBBX ABBXA ABDZT ABECU ABFSG ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABLJU ABMNI ABMQK ABNWP ABQBU ABSXP ABTHY ABTMW ABUWG ABXPI ACBXY ACGFS ACHXU ACIHN ACKNC ACM ACMLO ACOKC ACOMO ACREN ACSNA ACSTC ADBSK ADHHG ADHIR ADIMF ADKNI ADKPE ADRFC ADURQ ADYFF ADYOE ADZKW AEAQA AEBTG AEGAL AEGNC AEJHL AEJOY AEJRE AEKMD AENEX AEOHA AEPYU AETLH AEXYK AEZWR AFBBN AFFHD AFGCZ AFHIU AFKRA AFLOW AFQWF AFWTZ AFWXC AFYQB AFZKB AGAYW AGDGC AGJBK AGQMX AGQPQ AGWIL AGWZB AGYKE AHBYD AHKAY AHSBF AHWEU AHYZX AIIXL AILAN AITGF AIXLP AJBLW AJRNO AJZVZ AKRVB ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMYQR AOCGG ARAPS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BDATZ BENPR BGLVJ BGNMA BPHCQ CCPQU CS3 CSCUP DL5 DNIVK DU5 DWQXO EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FINBP FNLPD FRRFC FSGXE FWDCC GGRSB GJIRD GNUQQ GNWQR GQ7 GQ8 GUFHI GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- ITM IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX K6V K7- KDC KOV LAS LHSKQ M4Y MA- N2Q N9A NB0 NQJWS NU0 O9- O93 O9G O9I O9J OAM OK1 P19 P62 P9O PF0 PHGZM PHGZT PQGLB PQQKQ PROAC PT5 Q2X QOK QOS R89 R9I RHV RNS ROL RPX RSV RYH S16 S27 S3B SAP SCO SDH SDM SHX SISQX SNPRN SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W48 WK8 YLTOR Z45 ZMTXR ~EX -4Z -59 -5G -BR -EM -Y2 -~C .4S 1SB 28- 2P1 2VQ 3V. 5QI 5VS AAAVM AAOBN AARHV AAYZH ABDPE ABMOR ABQSL ABTAH ABTEG ACZOJ ADINQ ADPZR AEFIE AFEXP AGGDS AHAVH ARCSS BBWZM CAG COF EDO FIGPU GGCAI GQ6 I-F KOW M0N NDZJH R4E RIG RNI RZK S1Z S26 S28 SCJ SCLPG SNE SNX T16 W23 Z7X Z81 Z83 Z88 Z8R Z8U Z8W Z92 ZY4 AAYXX ADHKG CITATION 7SC 7XB 8AL 8FD 8FK JQ2 L7M L~C L~D PKEHL PQEST PQUKI PRINS PUEGO Q9U |
| ID | FETCH-LOGICAL-c487t-bc2e2ef47094ce3c2d670a935609a9b4f553ab645c6dd81ac3fc95d3013a422c3 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 2 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000329102400007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0934-5043 |
| IngestDate | Sun Nov 09 09:09:55 EST 2025 Sat Aug 23 13:24:47 EDT 2025 Sat Nov 29 01:39:32 EST 2025 Tue Nov 18 20:50:28 EST 2025 Fri Feb 21 02:37:21 EST 2025 Mon Nov 10 09:18:10 EST 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | Program refinement Probabilistic non-interference Non-interference security Program semantics |
| Language | English |
| License | http://www.springer.com/tdm |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c487t-bc2e2ef47094ce3c2d670a935609a9b4f553ab645c6dd81ac3fc95d3013a422c3 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 |
| ORCID | 0000-0002-5272-820x 0000-0002-6802-7360 0000-0002-2405-9838 |
| OpenAccessLink | https://dl.acm.org/doi/pdf/10.1007/s00165-012-0237-4 |
| PQID | 1473308441 |
| PQPubID | 43690 |
| PageCount | 26 |
| ParticipantIDs | proquest_miscellaneous_1494315338 proquest_journals_1473308441 crossref_citationtrail_10_1007_s00165_012_0237_4 crossref_primary_10_1007_s00165_012_0237_4 springer_journals_10_1007_s00165_012_0237_4 nii_cinii_1872835442656685824 |
| PublicationCentury | 2000 |
| PublicationDate | 2014-01-01 20140100 2014-01-00 20140101 |
| PublicationDateYYYYMMDD | 2014-01-01 |
| PublicationDate_xml | – month: 01 year: 2014 text: 2014-01-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | London |
| PublicationPlace_xml | – name: London |
| PublicationSubtitle | Applicable Formal Methods |
| PublicationTitle | Formal Aspects of Computing |
| PublicationTitleAbbrev | Form Asp Comp |
| PublicationYear | 2014 |
| Publisher | Association for Computing Machinery (ACM) Springer London Association for Computing Machinery |
| Publisher_xml | – name: Association for Computing Machinery (ACM) – name: Springer London – name: Association for Computing Machinery |
| References | Micali, Rogaway, Feigenbaum (CR36) 1991 Goldwasser, Levin, Menezes, Vanstone (CR16) 1990 Grimmett, Welsh (CR21) 1986 CR19 CR18 CR17 Leino, Joshi (CR25) 2000; 37 CR39 CR38 Shannon (CR43) 1948; 27 Paulson (CR37) 1998; 6 CR12 CR34 Goldreich, Canetti, Halevi (CR41) 2004; 51 Chaum (CR14) 1988; 1 Morris (CR32) 1987; 9 CR33 CR10 CR31 CR30 Backes, Pfitzmann (CR9) 2004; 3 Chor, Goldreich, Kushilevitz, Sudan (CR13) 1999; 45 Dolev, Yao (CR15) 1983; 29 Sabelfeld, Myers (CR44) 2003; 21 CR4 CR3 CR6 CR8 CR7 Abrial (CR2) 1996 CR28 CR27 CR26 Morgan (CR35) 2009; 74 CR24 CR46 CR23 CR45 CR22 CR20 CR40 Santen (CR42) 2008; 206 Abrial, Butler, Hallerstede, Hoang, Mehta, Voisin (CR1) 2010; 12 Back, von Wright (CR11) 1998 Beaver, Feigenbaum (CR5) 1991 McIver, Morgan (CR29) 2011; 23 e_1_2_1_2_17_2 e_1_2_1_2_19_2 e_1_2_1_2_38_2 e_1_2_1_2_18_2 e_1_2_1_2_39_2 e_1_2_1_2_32_2 e_1_2_1_2_33_2 e_1_2_1_2_11_2 e_1_2_1_2_30_2 e_1_2_1_2_10_2 e_1_2_1_2_31_2 e_1_2_1_2_12_2 e_1_2_1_2_37_2 Goldreich O (e_1_2_1_2_41_2) 2004; 51 e_1_2_1_2_15_2 e_1_2_1_2_34_2 e_1_2_1_2_14_2 e_1_2_1_2_35_2 Chor B (e_1_2_1_2_13_2) 1999; 45 e_1_2_1_2_40_2 Goldwasser S (e_1_2_1_2_16_2) 1990 e_1_2_1_2_29_2 e_1_2_1_2_27_2 e_1_2_1_2_28_2 e_1_2_1_2_44_2 e_1_2_1_2_22_2 e_1_2_1_2_43_2 e_1_2_1_2_42_2 e_1_2_1_2_20_2 Micali S (e_1_2_1_2_36_2) 1991 e_1_2_1_2_25_2 e_1_2_1_2_26_2 e_1_2_1_2_23_2 e_1_2_1_2_46_2 e_1_2_1_2_24_2 e_1_2_1_2_45_2 e_1_2_1_2_9_2 Grimmett GR (e_1_2_1_2_21_2) 1986 Beaver D (e_1_2_1_2_5_2) 1991 e_1_2_1_2_6_2 e_1_2_1_2_7_2 e_1_2_1_2_8_2 e_1_2_1_2_1_2 e_1_2_1_2_2_2 e_1_2_1_2_3_2 e_1_2_1_2_4_2 |
| References_xml | – start-page: 392 year: 1991 end-page: 404 ident: CR36 article-title: Secure computation (abstract) publication-title: CRYPTO ’91. LNCS, vol 576 – ident: CR45 – ident: CR22 – volume: 74 start-page: 629 issue: 8 year: 2009 end-page: 653 ident: CR35 article-title: The Shadow Knows: refinement of ignorance in sequential programs publication-title: Sci Comput Program doi: 10.1016/j.scico.2007.09.003 – ident: CR18 – volume: 45 start-page: 965 issue: 6 year: 1999 end-page: 982 ident: CR13 article-title: Private information retrieval publication-title: J ACM doi: 10.1145/293347.293350 – volume: 206 start-page: 213 issue: 2–4 year: 2008 end-page: 249 ident: CR42 article-title: Preservation of probabilistic information flow under refinement publication-title: Inf Comput doi: 10.1016/j.ic.2007.07.008 – year: 1998 ident: CR11 publication-title: Refinement calculus: a systematic introduction doi: 10.1007/978-1-4612-1674-2 – ident: CR4 – volume: 3 start-page: 42 issue: 1 year: 2004 end-page: 60 ident: CR9 article-title: Computational probabilistic noninterference publication-title: Int J Inf Secur doi: 10.1007/s10207-004-0039-7 – volume: 6 start-page: 85 year: 1998 end-page: 128 ident: CR37 article-title: The inductive approach to verifying cryptographic protocols publication-title: J Comput Secur – ident: CR39 – ident: CR12 – ident: CR30 – volume: 51 start-page: 557 issue: 4 year: 2004 end-page: 594 ident: CR41 article-title: The random oracle methodology, revisited publication-title: JACM doi: 10.1145/1008731.1008734 – ident: CR10 – ident: CR33 – year: 1986 ident: CR21 publication-title: Probability: an introduction – ident: CR6 – ident: CR8 – ident: CR40 – volume: 1 start-page: 65 issue: 1 year: 1988 end-page: 75 ident: CR14 article-title: The dining cryptographers problem: unconditional sender and recipient untraceability publication-title: J Cryptol doi: 10.1007/BF00206326 – volume: 21 start-page: 5 issue: 1 year: 2003 end-page: 19 ident: CR44 article-title: Language-based information-flow security publication-title: IEEE J Sel Areas Commun doi: 10.1109/JSAC.2002.806121 – ident: CR27 – ident: CR23 – ident: CR46 – ident: CR19 – volume: 37 start-page: 113 issue: 1–3 year: 2000 end-page: 138 ident: CR25 article-title: A semantic approach to secure information flow publication-title: Sci Comput Program – volume: 27 start-page: 379 year: 1948 end-page: 423 ident: CR43 article-title: A mathematical theory of communication publication-title: Bell Syst Tech J – volume: 12 start-page: 447 issue: 6 year: 2010 end-page: 466 ident: CR1 article-title: Rodin: an open toolset for modelling and reasoning in Event-B publication-title: STTT doi: 10.1007/s10009-010-0145-y – ident: CR3 – volume: 9 start-page: 287 issue: 3 year: 1987 end-page: 306 ident: CR32 article-title: A theoretical basis for stepwise refinement and the programming calculus publication-title: Sci Comput Program doi: 10.1016/0167-6423(87)90011-6 – ident: CR38 – ident: CR17 – ident: CR31 – volume: 23 start-page: 711 issue: 6 year: 2011 end-page: 737 ident: CR29 article-title: Compositional refinement in agent-based security protocols publication-title: Formal Aspects Comput doi: 10.1007/s00165-010-0164-1 – start-page: 77 year: 1990 end-page: 93 ident: CR16 article-title: Fair computation of general functions in presence of immoral majority publication-title: CRYPTO ’90 – ident: CR34 – ident: CR7 – year: 1996 ident: CR2 publication-title: The B Book: assigning programs to meanings doi: 10.1017/CBO9780511624162 – ident: CR28 – ident: CR26 – start-page: 377 year: 1991 end-page: 391 ident: CR5 article-title: Foundations of secure interactive computing publication-title: CRYPTO ’91. LNCS, vol 576 – volume: 29 start-page: 198 issue: 2 year: 1983 end-page: 208 ident: CR15 article-title: On the security of public key protocols publication-title: IEEE Trans Inf Theory doi: 10.1109/TIT.1983.1056650 – ident: CR24 – ident: CR20 – ident: e_1_2_1_2_33_2 – ident: e_1_2_1_2_27_2 doi: 10.1007/978-3-642-03466-4_3 – ident: e_1_2_1_2_14_2 doi: 10.1007/BF00206326 – ident: e_1_2_1_2_26_2 doi: 10.1109/SECPRI.2001.924289 – ident: e_1_2_1_2_44_2 doi: 10.1109/JSAC.2002.806121 – ident: e_1_2_1_2_8_2 doi: 10.1007/3-540-45853-0_1 – ident: e_1_2_1_2_43_2 doi: 10.5555/1102016 – ident: e_1_2_1_2_45_2 doi: 10.1007/978-3-540-78663-4_25 – start-page: 392 volume-title: CRYPTO ’91. LNCS, vol 576 year: 1991 ident: e_1_2_1_2_36_2 – ident: e_1_2_1_2_29_2 doi: 10.1007/s00165-010-0164-1 – ident: e_1_2_1_2_23_2 doi: 10.1007/11766155_19 – volume-title: Probability: an introduction year: 1986 ident: e_1_2_1_2_21_2 – ident: e_1_2_1_2_30_2 doi: 10.1007/978-3-642-14162-1_19 – ident: e_1_2_1_2_7_2 doi: 10.1109/CSFW.2001.930138 – ident: e_1_2_1_2_10_2 doi: 10.1145/168588.168596 – ident: e_1_2_1_2_17_2 doi: 10.1109/SP.1984.10019 – ident: e_1_2_1_2_19_2 doi: 10.1007/978-3-642-22670-0_34 – ident: e_1_2_1_2_4_2 – ident: e_1_2_1_2_11_2 doi: 10.1007/978-1-4612-1674-2 – ident: e_1_2_1_2_39_2 doi: 10.1109/SECPRI.2001.924298 – ident: e_1_2_1_2_25_2 doi: 10.1016/S0167-6423(99)00024-6 – ident: e_1_2_1_2_42_2 doi: 10.1016/j.ic.2007.07.008 – volume: 45 start-page: 965 issue: 6 year: 1999 ident: e_1_2_1_2_13_2 article-title: Private information retrieval publication-title: J ACM doi: 10.1145/293347.293350 – ident: e_1_2_1_2_18_2 – ident: e_1_2_1_2_35_2 doi: 10.1016/j.scico.2007.09.003 – ident: e_1_2_1_2_15_2 doi: 10.1109/TIT.1983.1056650 – ident: e_1_2_1_2_12_2 doi: 10.1109/SFCS.2001.959888 – ident: e_1_2_1_2_22_2 doi: 10.1007/978-3-642-12459-4_8 – ident: e_1_2_1_2_20_2 – ident: e_1_2_1_2_46_2 doi: 10.1109/SFCS.1982.38 – ident: e_1_2_1_2_9_2 doi: 10.1007/s10207-004-0039-7 – ident: e_1_2_1_2_32_2 doi: 10.1016/0167-6423(87)90011-6 – start-page: 377 volume-title: CRYPTO ’91. LNCS, vol 576 year: 1991 ident: e_1_2_1_2_5_2 – ident: e_1_2_1_2_31_2 – ident: e_1_2_1_2_1_2 doi: 10.1007/s10009-010-0145-y – ident: e_1_2_1_2_34_2 doi: 10.1007/11783596_21 – ident: e_1_2_1_2_2_2 doi: 10.1017/CBO9780511624162 – ident: e_1_2_1_2_24_2 doi: 10.1145/1315245.1315282 – ident: e_1_2_1_2_37_2 doi: 10.5555/353677.353681 – ident: e_1_2_1_2_38_2 – ident: e_1_2_1_2_28_2 doi: 10.1007/978-1-84882-912-1_12 – start-page: 77 volume-title: CRYPTO ’90 year: 1990 ident: e_1_2_1_2_16_2 – ident: e_1_2_1_2_40_2 – ident: e_1_2_1_2_6_2 doi: 10.1109/SEFM.2003.1236206 – ident: e_1_2_1_2_3_2 doi: 10.1007/978-3-642-12002-2_32 – volume: 51 start-page: 557 issue: 4 year: 2004 ident: e_1_2_1_2_41_2 article-title: The random oracle methodology, revisited publication-title: JACM doi: 10.1145/1008731.1008734 |
| SSID | ssib031263365 ssib001220187 ssib000435920 ssib004908138 ssib004297782 ssib051000125 ssj0015911 ssib000716331 ssib021413543 |
| Score | 1.963592 |
| Snippet | The Shadow Semantics (Morgan, Math Prog Construction, vol 4014, pp 359–378,
2006
; Morgan, Sci Comput Program 74(8):629–653,
2009
) is a possibilistic... The Shadow Semantics (Morgan, Math Prog Construction, vol 4014, pp 359-378, 2006 ; Morgan, Sci Comput Program 74(8):629-653, 2009 ) is a possibilistic... The Shadow Semantics (Morgan, Math Prog Construction, vol 4014, pp 359-378, 2006; Morgan, Sci Comput Program 74(8):629-653, 2009) is a possibilistic... |
| SourceID | proquest crossref springer nii |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 169 |
| SubjectTerms | Computation Computer Science Math Applications in Computer Science Non-interference security Original Article Probabilistic non-interference Program refinement Program semantics Theory of Computation |
| SummonAdditionalLinks | – databaseName: Advanced Technologies & Aerospace Database dbid: P5Z link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT9wwEB4V2gOX0lIQy6NyJU5UVhPHju1eKlQV9dAiDrRCXKLEdqSVULLd7PL7mfE6S6lULlxyiB-xMn5847G_D-AkiGCV0I4r2Wh0UArPjWlwuIugQ-ZtyKJKxO8f-uLCXF_by7ThNqRjleOcGCdq3zvaI_-US42ut8HV-8vsDyfVKIquJgmNDXhJLAkk3XCpbtZRBGWj_i467ZITU9cY1cwiiWhe0rE1wXHVwlY-Wpc2uun0EeT8J0oaF5_z7ec2-w28TrCTna36yVt4Ebod2B4lHVga4e_g51lDex_xssPA-pZ1fceJUmKe7gWyIQnefWakRRP5eYnqmdHxjuXAZv2wOnBLL3fh1_m3q6_feVJc4A4dlwVvnEDjtVKj0-dC4YQvdVbbAmGRrW0jW6WKuimlcqX3Jq9d0TqrPE4SRS2FcMUebGK7wj6wLEjjlc-z2jvZohtTYpm8RLTkdCGzZgLZ-L8rl-jISRXjtloTKUcTVWiiikxUyQmcrovMVlwcT2U-RiNi1fTMjSZeOYlwBOGrUUZg-tFosCoN26F6sNYEPqyTccBRFKXuQr-kPBZBF6JkM4GPY7f4q4r_Nejg6Q8ewhZiMbna3TmCzcV8GY7hlbtbTIf5-9iv7wF1Tfoo priority: 102 providerName: ProQuest |
| Title | Abstractions of non-interference security: probabilistic versus possibilistic |
| URI | https://cir.nii.ac.jp/crid/1872835442656685824 https://link.springer.com/article/10.1007/s00165-012-0237-4 https://www.proquest.com/docview/1473308441 https://www.proquest.com/docview/1494315338 |
| Volume | 26 |
| WOSCitedRecordID | wos000329102400007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 1433-299X dateEnd: 20190131 omitProxy: false ssIdentifier: ssj0015911 issn: 0934-5043 databaseCode: P5Z dateStart: 20020501 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1433-299X dateEnd: 20190131 omitProxy: false ssIdentifier: ssj0015911 issn: 0934-5043 databaseCode: K7- dateStart: 20020501 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1433-299X dateEnd: 20190131 omitProxy: false ssIdentifier: ssj0015911 issn: 0934-5043 databaseCode: BENPR dateStart: 20020501 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVAVX databaseName: Springer Standard Collection customDbUrl: eissn: 1433-299X dateEnd: 20211231 omitProxy: false ssIdentifier: ssj0015911 issn: 0934-5043 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LaxsxEB7iuIde8uiDunGMCj21CNZ6rKTc3GATSGKM2wbTy7IracFQ1sFr5_d3tN5d6pIUkosOu5IQGj2-0cx8A_DZM28kU5ZKkSlUULijWme43ZlXPnLGR1WWiLsbNZ3qxcLM6jjusvF2b0yS1UndBrsFdBIczRjFewb77UAXbzsd8jXMv9-1pgNpqqS7qKkLGui5GlPmY13sXUadYrncw5n_mEarG2dy_KKxnsBRDTDJaLciTuHAF2_guEneQOq9_BZuR1l45ajCGkqyykmxKmggj1jXEYCkrFPbXZCQdaZi4g2kziQ4cmxLcr8qd6614eM7-DkZ_7i8onVuBWpRRdnQzDIUUy4UqnfWc8tcrKLUcARAJjWZyKXkaRYLaWPn9DC1PLdGOjwOeCoYs_w9HOK4_AcgkRfaSTeMUmdFjgpLjG2GMeIiq7iIsh5EzSQntiYeD_kvfictZXI1XQlOVxKmKxE9-NI2ud-xbvyv8jlKDrsO5VCrwCAnEHggUNVSM_zfb2Sa1Bu0RI1HcR5pBIM9-NT-xq0V7CVp4VfbUMcgvEI8rHvwtZHzX108NaCPz6p9Bq8RhInds04fDjfrrT-HV_ZhsyzXA-h-G09n8wF0rhXFciZ_Dar1_gfbXPLU |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB61BQkulKdYaMFIcAFZJLYT25WqqgKqVrtdcSiot5DYjrQSSpbNLog_xW9kJo-lRaK3HrjkkDiOk8zTY38fwMsggk2EdjxRhcYERXpuTIHqLoIOkbchalkiPk_0dGrOz-3HDfg17IWhZZWDTWwNta8dzZG_jZXG1Nug9z6Yf-PEGkXV1YFCoxOLcfj5A1O2Zv_kPf7fV0IcfTh7d8x7VgHuMDhf8sIJHGCpNCY2LkgnfKqj3Ep0_Ta3hSqTROZFqhKXem_i3MnS2cSjIshcCeEk9rsJN5Q0mvRqrPm6apHYlu83slJxQgYbqqhRC1oap7RMTnD0kvhVLvnBzWo2uxTi_lWVbZ3d0fb_9pnuwp0-rGaHnR7cg41Q3YftgbKC9RbsAZweFjS3027maFhdsqquOEFmLPp9j6zpCf32GHHttPjDBGXNaPnKqmHzuukWFNPJh_DpWl7qEWzhuMJjYFFQxic-jnLvVIlpWor3xClGg05LFRUjiIb_m7kebp1YP75ma6DoViQyFImMRCJTI3i9vmXeYY1c1XgXhQa7pmNsNOHmKQy3MDw3iRF4fWcQkKw3S032RzpG8GJ9GQ0KVYnyKtQramMxqMQswIzgzSCGF7r414CeXP3A53Dr-Ox0kk1OpuOncBvjTtXNZO3A1nKxCrtw031fzprFs1anGHy5bun8Dcd_Vvs |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3da9swED_Wroy-rGu30WzNpkGfNkwdfVjS3kK3sLE2FNaGvBlbkiEwnBAn_ft75y_W0Q3KXvxgfVhIOut3urvfAZwGHqzi2kVK5hoVFOEjY3IUdx50iL0NcZ0lYnahp1Mzn9urNs9p1Xm7dybJJqaBWJrKzdnKF2d94BshFXI64xGeOfiNHXgqyY-e1PWfs96MoGydgBe1dhkRVVdn1nyoi3sH0065WNzDnH-YSevTZ3Lw3-N-Ac9b4MnGzU45hCehPIKDLqkDa2X8JVyOc7r9qMMdKrYsWLksIyKVWLeRgaxqU959ZpSNpmboJbJnRg4e24qtllXjcksvX8HN5Ov1-beozbkQOVRdNlHuOC5fITWqfS4Ix32i48wKBEY2s7kslBJZnkjlEu_NKHOicFZ5_E2ITHLuxGvYxXGFY2BxkMYrP4oz72SBikyCbUYJ4iWnhYzzAcTdhKeuJSSnvBi_0p5KuZ6uFKcrpelK5QA-9k1WDRvHvyoPcRWxa3qOjCZmOYmABAGsUYZj-Um3vmkruBVqQlqI2CBIHMCHvhhFjuwoWRmWW6pjEXYhTjYD-NSt-W9d_G1Abx5V-z08u_oySS--T3-8hX3EabK5-TmB3c16G4aw5243i2r9rt7yd9xm-zI |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Abstractions+of+non-interference+security%3A+probabilistic+versus+possibilistic&rft.jtitle=Formal+aspects+of+computing&rft.au=Hoang%2C+T+S&rft.au=McIver%2C+A+K&rft.au=Meinicke%2C+L&rft.au=Morgan%2C+C+C&rft.date=2014-01-01&rft.issn=0934-5043&rft.eissn=1433-299X&rft.volume=26&rft.issue=1&rft.spage=169&rft.epage=194&rft_id=info:doi/10.1007%2Fs00165-012-0237-4&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0934-5043&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0934-5043&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0934-5043&client=summon |