Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,738,029 papers from all fields of science
Search
Sign In
Create Free Account
Non-interference (security)
Known as:
Non-interference
Non-interference is a strict multilevel security policy model, first described by Goguen and Meseguer in 1982, and amplified further in 1984.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Bell–LaPadula model
Computer security model
Information
Language-based security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
Who Can Declassify?
Alexander Lux
,
H. Mantel
USENIX Conference on File and Storage…
2009
Corpus ID: 31597988
Noninterference provides reliable guarantees for the confidentiality of sensitive information, but it is too restrictive if…
Expand
2007
2007
A Hardware Platform for Utilizing TV Bands With a Wi-Fi Radio
Srihari Narlanka
,
Ranveer Chandra
,
P. Bahl
,
John Ian Ferrell
IEEE Workshop on Local and Metropolitan Area…
2007
Corpus ID: 17120075
The Federal Communications Commission (FCC) is currently exploring the use of TV bands for unlicensed communication. This step…
Expand
2007
2007
A Library for Secure Multi-threaded Information Flow in Haskell
Ta-Chung Tsai
,
Alejandro Russo
,
John Hughes
IEEE Computer Security Foundations Symposium
2007
Corpus ID: 10232976
Li and Zdancewic have recently proposed an approach to provide information-flow security via a library rather than producing a…
Expand
Highly Cited
2006
Highly Cited
2006
Unrestricted Transactional Memory: Supporting I/O and System Calls Within Transactions
Comments Comments
,
Colin Blundell
,
E. Lewis
,
Milo M. K. Martin
2006
Corpus ID: 1005509
Hardware transactional memory has great potential to simplify the creation of correct and efficient multithreaded programs…
Expand
2003
2003
Reasoning on AspectJ Programmes
L. Blair
,
Mattia Monga
2003
Corpus ID: 14402369
In this paper we suggest that in order to analyse the proper- ties of an AspectJ aspect one can consider the aspect itself and…
Expand
Highly Cited
2001
Highly Cited
2001
Information flow control in role-based model for distributed objects
Keiji Izaki
,
Katsuya Tanaka
,
M. Takizawa
Proceedings. Eighth International Conference on…
2001
Corpus ID: 29819282
Various kinds of distributed applications are realized in object-based frameworks. Object-based technologies are used to design…
Expand
Highly Cited
1999
Highly Cited
1999
Uplink admission control and soft capacity with MUD in CDMA
H. Holma
,
Janne Laakso
,
Nokia
Gateway to 21st Century Communications Village…
1999
Corpus ID: 58609019
This paper presents an analysis of the WCDMA uplink capacity with admission control and multiuser detection (MUD). An uplink…
Expand
1997
1997
Design and Analysis of an Adaptive Policy for Secure Real-Time Locking Protocol
S. Son
,
R. David
,
Craig Chaney
Information Sciences
1997
Corpus ID: 31224645
1996
1996
Non-Interference Properties of a Concurrent Object-Based Language: Proofs Based on an Operational Semantics
S. Hodges
,
Cliff B. Jones
Object Orientation with Parallelism and…
1996
Corpus ID: 37577922
A carefully designed concurrent object-oriented language can provide a suitable target for a compositional design process that…
Expand
1980
1980
Students' attitudes towards suicide
G. Domino
,
Linda M. Gibson
,
Steven Poling
,
L. Westlake
Social Psychiatry
1980
Corpus ID: 295889
SummaryAttitudes of 800 college students from nine institutions were assessed by means of a 100 item Suicide Opinion…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE