Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,368,738 papers from all fields of science
Search
Sign In
Create Free Account
Non-interference (security)
Known as:
Non-interference
Non-interference is a strict multilevel security policy model, first described by Goguen and Meseguer in 1982, and amplified further in 1984.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Bell–LaPadula model
Computer security model
Information
Language-based security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Towards Quantitative Analysis of Opacity
J. Bryans
,
M. Koutny
,
C. Mu
Trustworthy Global Computing
2012
Corpus ID: 6759964
Opacity is a general approach for describing and unifying security properties expressed as predicates. A predicate is opaque if…
Expand
2008
2008
Al2O3-coated microcantilevers for detection of moisture at ppm level
Xiaolei Shi
,
Qi Chen
,
Ji Fang
,
Koday Varahramyan
,
H. Ji
2008
Corpus ID: 33076810
2007
2007
A Hardware Platform for Utilizing TV Bands With a Wi-Fi Radio
Srihari Narlanka
,
Ranveer Chandra
,
P. Bahl
,
John Ian Ferrell
IEEE Workshop on Local and Metropolitan Area…
2007
Corpus ID: 17120075
The Federal Communications Commission (FCC) is currently exploring the use of TV bands for unlicensed communication. This step…
Expand
2007
2007
A Library for Secure Multi-threaded Information Flow in Haskell
Ta-Chung Tsai
,
Alejandro Russo
,
John Hughes
IEEE Computer Security Foundations Symposium
2007
Corpus ID: 10232976
Li and Zdancewic have recently proposed an approach to provide information-flow security via a library rather than producing a…
Expand
Highly Cited
2006
Highly Cited
2006
Unrestricted Transactional Memory: Supporting I/O and System Calls Within Transactions
Comments Comments
,
Colin Blundell
,
E. Lewis
,
Milo M. K. Martin
2006
Corpus ID: 1005509
Hardware transactional memory has great potential to simplify the creation of correct and efficient multithreaded programs…
Expand
Highly Cited
2003
Highly Cited
2003
Interference Analysis for AspectJ
Maximilian Störzer
,
J. Krinke
2003
Corpus ID: 16097814
AspectJ is a language implementing aspect-oriented programming on top of Java. Besides modification of program flow and state…
Expand
Highly Cited
2001
Highly Cited
2001
Information flow control in role-based model for distributed objects
Keiji Izaki
,
Katsuya Tanaka
,
M. Takizawa
Proceedings. Eighth International Conference on…
2001
Corpus ID: 29819282
Various kinds of distributed applications are realized in object-based frameworks. Object-based technologies are used to design…
Expand
1997
1997
Design and Analysis of an Adaptive Policy for Secure Real-Time Locking Protocol
S. Son
,
R. David
,
Craig Chaney
Information Sciences
1997
Corpus ID: 31224645
1996
1996
Non-Interference Properties of a Concurrent Object-Based Language: Proofs Based on an Operational Semantics
S. Hodges
,
Cliff B. Jones
Object Orientation with Parallelism and…
1996
Corpus ID: 37577922
A carefully designed concurrent object-oriented language can provide a suitable target for a compositional design process that…
Expand
1986
1986
The Origins of the Religion Clauses of the Constitution
P. Kurland
1986
Corpus ID: 153435558
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE