Abstract
This paper introduces a versatile operator for modifying CSP processes to satisfy particular information flow security requirements. We present and justify an algebraic semantics for this operator, which allows us to derive secure processes from (potentially) insecure processes in a calculational style. Moreover, the operator simplifies the task of verifying the security of processes.
Original language | Undefined/Unknown |
---|---|
Pages | 19--28 |
Publication status | Published - 1 Nov 2010 |