By the same authors

Calculated Secure Processes

Research output: Contribution to conferencePaper

Standard

Calculated Secure Processes. / Banks, Michael J.; Jacob, Jeremy L.

2010. 19--28.

Research output: Contribution to conferencePaper

Harvard

Banks, MJ & Jacob, JL 2010, 'Calculated Secure Processes' pp. 19--28.

APA

Banks, M. J., & Jacob, J. L. (2010). Calculated Secure Processes. 19--28.

Vancouver

Banks MJ, Jacob JL. Calculated Secure Processes. 2010.

Author

Banks, Michael J. ; Jacob, Jeremy L. / Calculated Secure Processes.

Bibtex - Download

@conference{5ffb8c4cc55a45fbbde7de474fd74d1c,
title = "Calculated Secure Processes",
abstract = "This paper introduces a versatile operator for modifying CSP processes to satisfy particular information flow security requirements. We present and justify an algebraic semantics for this operator, which allows us to derive secure processes from (potentially) insecure processes in a calculational style. Moreover, the operator simplifies the task of verifying the security of processes.",
author = "Banks, {Michael J.} and Jacob, {Jeremy L.}",
year = "2010",
month = "11",
day = "1",
language = "Undefined/Unknown",
pages = "19----28",

}

RIS (suitable for import to EndNote) - Download

TY - CONF

T1 - Calculated Secure Processes

AU - Banks, Michael J.

AU - Jacob, Jeremy L.

PY - 2010/11/1

Y1 - 2010/11/1

N2 - This paper introduces a versatile operator for modifying CSP processes to satisfy particular information flow security requirements. We present and justify an algebraic semantics for this operator, which allows us to derive secure processes from (potentially) insecure processes in a calculational style. Moreover, the operator simplifies the task of verifying the security of processes.

AB - This paper introduces a versatile operator for modifying CSP processes to satisfy particular information flow security requirements. We present and justify an algebraic semantics for this operator, which allows us to derive secure processes from (potentially) insecure processes in a calculational style. Moreover, the operator simplifies the task of verifying the security of processes.

M3 - Paper

SP - 19

EP - 28

ER -