Non-interference (security)

Known as: Non-interference 
Non-interference is a strict multilevel security policy model, first described by Goguen and Meseguer in 1982, and amplified further in 1984.
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Differential power analysis (DPA) is a side-channel attack in which an adversary retrieves cryptographic material by measuring… (More)
  • figure 1
  • figure 2
  • figure 4
  • table 1
  • table 2
Is this relevant?
2012
2012
The Shadow Semantics (Morgan, Math Prog Construction, vol 4014, pp 359–378, 2006; Morgan, Sci Comput Program 74(8):629–653, 2009… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
We investigate non-interference (secure information flow) policies for web browsers, replacing or complementing the Same Origin… (More)
  • table I
  • table III
  • table V
Is this relevant?
2007
2007
In this paper, the problem of synthesizing controllers that ensures non interference for multilevel security dense timed discrete… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • table 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We present a constructive authorization logic where the meanings of connectives are defined by their associated inference rules… (More)
  • figure 1
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In this paper we generalize the notion of non-interference making it parametric relatively to what an attacker can analyze about… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2001
2001
The concept of non-interference seeks to characterize the absence of information flows through a computer system. The intuition… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We present a framework in which different notions of security can be defined in a uniform and modular way. Each definition of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
In the recent years, many formalizations of security properties have been proposed, most of which are based on different… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
1994
1994
The standard approach to the specification of a secure system is to present a (usually state-hased) abstract security model… (More)
Is this relevant?