Filters








5,199 Hits in 0.97 sec

Noninterference for free

William J. Bowman, Amal Ahmed
2015 SIGPLAN notices  
The proof of noninterference for DCC suggests a connection to parametricity in System F, which suggests that it should be possible to implement dependency analyses in languages with parametric polymorphism  ...  and prove that the translation preserves noninterference. To express noninterference in F!  ...  However, our translation produces types that contain free variables ↵ and ↵`, and terms with the free variables from + . If our F!  ... 
doi:10.1145/2858949.2784733 fatcat:xgl5b76by5ehzlbe2ilsqvfghi

Noninterference for free

William J. Bowman, Amal Ahmed
2015 Proceedings of the 20th ACM SIGPLAN International Conference on Functional Programming - ICFP 2015  
The proof of noninterference for DCC suggests a connection to parametricity in System F, which suggests that it should be possible to implement dependency analyses in languages with parametric polymorphism  ...  and prove that the translation preserves noninterference. To express noninterference in F!  ...  However, our translation produces types that contain free variables ↵ and ↵`, and terms with the free variables from + . If our F!  ... 
doi:10.1145/2784731.2784733 dblp:conf/icfp/BowmanA15 fatcat:woyubwlwvvhk5pfm7icwwbtj2i

Type-based Declassification for Free [article]

Minh Ngo and David A. Naumann and Tamara Rezk
2020 arXiv   pre-print
Our study focuses on information flow security encompassing declassification policies that allow us to express flexible security policies needed for practical requirements.  ...  We translate security policies, with declassification, into an interface for which an unmodified standard typechecker can be applied to a source program---if the program typechecks, it provably satisfies  ...  We thank anonymous reviewers for their suggestions.  ... 
arXiv:1905.00922v3 fatcat:zz5kbzhkxzdifh2bzgtsicyjm4

Freedom and Actual Interference

Jonah Goldwater
2019 Journal of Ethics and Social Philosophy  
The liberal noninterference conception of freedom, therefore, can account for what Pettit claims can only be accounted for by freedom as non-domination.  ...  Liberal and republican conceptions of freedom differ as to whether freedom consists in noninterference or non-domination.  ...  Because such a slave is not actually interfered with, the idea goes, the lucky slave would be deemed free by the theory of freedom as noninterference. But, of course, a slave is not free.  ... 
doi:10.26556/jesp.v17i2.660 fatcat:5olppgl5hjbydmwuaapbk2eggy

Beyond the Rhetoric: Noninterference in China's African Policy

Steve Hess, Richard Aidoo
2010 African and Asian Studies  
support for noninterference over the last fifty years, the relevance of the principle in shaping Beijing's foreign policy decisions has varied as its pragmatic interests have shifted.  ...  The following paper examines the historical origins and development of China's advocacy of the principle of noninterference in its African foreign policy and suggests that in spite of its consistent rhetorical  ...  Abdoulaye Saine and Professor Cyril Daddieh for their guidance and helpful feedback during the crafting of this article.  ... 
doi:10.1163/156921010x516003 fatcat:r5utuxs6vvcldkr4ofcbypg6ni

The Instability of Freedom as Noninterference: The Case of Isaiah Berlin [chapter]

Philip Pettit
2018 Political Philosophy in the Twenty-First Century  
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive.  ...  For more information about JSTOR, please contact support@jstor.org. . The University of Chicago Press is collaborating with JSTOR to digitize, preserve and extend access to Ethics.  ...  As he argues for freedom as noninterference over freedom as nonfrustration, so it is possible in parallel to argue for freedom as nondomination over freedom as noninterference.  ... 
doi:10.4324/9780429498190-11 fatcat:tftsio7eczcdvdoybpry6awyja

The Instability of Freedom as Noninterference: The Case of Isaiah Berlin

Philip Pettit
2011 Ethics: An International Journal of Social, Political, and Legal Philosophy  
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive.  ...  For more information about JSTOR, please contact support@jstor.org. . The University of Chicago Press is collaborating with JSTOR to digitize, preserve and extend access to Ethics.  ...  As he argues for freedom as noninterference over freedom as nonfrustration, so it is possible in parallel to argue for freedom as nondomination over freedom as noninterference.  ... 
doi:10.1086/660694 fatcat:g2vht5t6xrb3jpwpwkndephpde

A Theory of Noninterference for the π-Calculus [chapter]

Silvia Crafa, Sabina Rossi
2005 Lecture Notes in Computer Science  
We develop a theory of noninterference for a typed version of the πcalculus where types are used to assign secrecy levels to channels.  ...  Furthermore, we characterize noninterference in terms of bisimulation-like (partial) equivalence relations in the style of a stream of similar studies for other process calculi (e.g., CCS and CryptoSPA  ...  We further develop two quantifier-free characterizations of noninterference based on bisimulation-like (partial) equivalence relations.  ... 
doi:10.1007/11580850_2 fatcat:xlrmht6cqrfd7hzxvevhx3zzgu

Secure Information Flow for Concurrent Programs under Total Store Order

Jeffrey A. Vaughan, Todd Millstein
2012 2012 IEEE 25th Computer Security Foundations Symposium  
Finally, we show that the original type system is in fact sound under TSO for programs that are free of data races.  ...  We define a simple type system for possibilistic noninterference under SC and demonstrate that it is unsound under TSO.  ...  A type system for possibilistic noninterference of TSO programs.  ... 
doi:10.1109/csf.2012.20 dblp:conf/csfw/VaughanM12 fatcat:kqoqrjmmlzfe3jdcznogzd6mei

Strategic Noninterference [chapter]

Wojciech Jamroga, Masoud Tabatabaei
2015 IFIP Advances in Information and Communication Technology  
We also give a characterization of strategic noninterference through unwinding relations for specific subclasses of goals and for the simplified setting where a strategy is given as a parameter.  ...  we call strategic noninterference.  ...  By "deterministic", we essentially mean "quantifier-free".  ... 
doi:10.1007/978-3-319-18467-8_5 fatcat:fvims44th5farpdfunna4wda5q

Algorithmic Verification of Intransitive Noninterference for 3-domain Security Policies with a SAT Solver

Liu Zhifeng, Zhou Conghua, Ge Yun, Zhang Dong
2013 Applied Mathematics & Information Sciences  
In this paper we propose an automated verification approach to checking intransitive noninterference for deterministic finite state systems.  ...  For the case that there are no counterexamples, we also introduce the window induction proof method in order to avoid considering unnecessary iterations, and show that the induction proof can be performed  ...  and for helpful comments that improved this paper.  ... 
doi:10.12785/amis/070521 fatcat:2bwo5p62yfgwxbi2aakkulcciq

Noninterference Technique for Measurement of Turbine Engine Compressor Blade Stress

1982 Journal of Aircraft  
A secondary objective was to obtain operational experience with the prototype noninterference system for use in developing criteria for a full-scale (multistage compressor) noninterference system for routine  ...  ., ‘“‘Development of a Noninterference Technique for Measurement of Turbine Engine J.  ... 
doi:10.2514/3.57357 fatcat:b3uhhpvww5gt3hg6krhdvdufre

Page 280 of Sage Public Administration Abstracts Vol. 26, Issue 2 [page]

1999 Sage Public Administration Abstracts  
Philip Pettit claims that free- dom would be better understood as antipower than as noninterference.  ...  Is there something wrong with ‘‘free action’’? Journal of Theoretical Politics (UK) 10(3):259-273, July 1998. POLITICAL LIBERTY. POLITICAL PHILOSOPHY. RESEARCH TRENDS.  ... 

A Separation Logic for Enforcing Declarative Information Flow Control Policies [chapter]

David Costanzo, Zhong Shao
2014 Lecture Notes in Computer Science  
In this paper, we present a program logic for proving that a program does not release information about sensitive data in an unintended way.  ...  The logic is designed for reasoning about a C-like, imperative language with pointer manipulation and aliasing. We therefore make use of ideas from Separation Logic to reason about data in the heap.  ...  This weakening of noninterference is interesting for two reasons.  ... 
doi:10.1007/978-3-642-54792-8_10 fatcat:ag73fllnxzbvnmi3276yvyz6au

Declassification: Dimensions and principles

Andrei Sabelfeld, David Sands, J.D. Guttman
2009 Journal of Computer Security  
These principles shed light on existing definitions and may also serve as useful "sanity checks" for emerging models.  ...  A principal security concern for systems permitting information release is whether this release is safe: is it possible that the attacker compromises the information release mechanism and extracts more  ...  Myers and Pablo Giambiagi for fruitful discussions.  ... 
doi:10.3233/jcs-2009-0352 fatcat:c6ngeq6bbrgnvfdc6r3jjqz77a
« Previous Showing results 1 — 15 out of 5,199 results