A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Noninterference for free
2015
SIGPLAN notices
The proof of noninterference for DCC suggests a connection to parametricity in System F, which suggests that it should be possible to implement dependency analyses in languages with parametric polymorphism ...
and prove that the translation preserves noninterference. To express noninterference in F! ...
However, our translation produces types that contain free variables ↵ and ↵`, and terms with the free variables from + . If our F! ...
doi:10.1145/2858949.2784733
fatcat:xgl5b76by5ehzlbe2ilsqvfghi
Noninterference for free
2015
Proceedings of the 20th ACM SIGPLAN International Conference on Functional Programming - ICFP 2015
The proof of noninterference for DCC suggests a connection to parametricity in System F, which suggests that it should be possible to implement dependency analyses in languages with parametric polymorphism ...
and prove that the translation preserves noninterference. To express noninterference in F! ...
However, our translation produces types that contain free variables ↵ and ↵`, and terms with the free variables from + . If our F! ...
doi:10.1145/2784731.2784733
dblp:conf/icfp/BowmanA15
fatcat:woyubwlwvvhk5pfm7icwwbtj2i
Type-based Declassification for Free
[article]
2020
arXiv
pre-print
Our study focuses on information flow security encompassing declassification policies that allow us to express flexible security policies needed for practical requirements. ...
We translate security policies, with declassification, into an interface for which an unmodified standard typechecker can be applied to a source program---if the program typechecks, it provably satisfies ...
We thank anonymous reviewers for their suggestions. ...
arXiv:1905.00922v3
fatcat:zz5kbzhkxzdifh2bzgtsicyjm4
Freedom and Actual Interference
2019
Journal of Ethics and Social Philosophy
The liberal noninterference conception of freedom, therefore, can account for what Pettit claims can only be accounted for by freedom as non-domination. ...
Liberal and republican conceptions of freedom differ as to whether freedom consists in noninterference or non-domination. ...
Because such a slave is not actually interfered with, the idea goes, the lucky slave would be deemed free by the theory of freedom as noninterference. But, of course, a slave is not free. ...
doi:10.26556/jesp.v17i2.660
fatcat:5olppgl5hjbydmwuaapbk2eggy
Beyond the Rhetoric: Noninterference in China's African Policy
2010
African and Asian Studies
support for noninterference over the last fifty years, the relevance of the principle in shaping Beijing's foreign policy decisions has varied as its pragmatic interests have shifted. ...
The following paper examines the historical origins and development of China's advocacy of the principle of noninterference in its African foreign policy and suggests that in spite of its consistent rhetorical ...
Abdoulaye Saine and Professor Cyril Daddieh for their guidance and helpful feedback during the crafting of this article. ...
doi:10.1163/156921010x516003
fatcat:r5utuxs6vvcldkr4ofcbypg6ni
The Instability of Freedom as Noninterference: The Case of Isaiah Berlin
[chapter]
2018
Political Philosophy in the Twenty-First Century
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. ...
For more information about JSTOR, please contact support@jstor.org. . The University of Chicago Press is collaborating with JSTOR to digitize, preserve and extend access to Ethics. ...
As he argues for freedom as noninterference over freedom as nonfrustration, so it is possible in parallel to argue for freedom as nondomination over freedom as noninterference. ...
doi:10.4324/9780429498190-11
fatcat:tftsio7eczcdvdoybpry6awyja
The Instability of Freedom as Noninterference: The Case of Isaiah Berlin
2011
Ethics: An International Journal of Social, Political, and Legal Philosophy
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. ...
For more information about JSTOR, please contact support@jstor.org. . The University of Chicago Press is collaborating with JSTOR to digitize, preserve and extend access to Ethics. ...
As he argues for freedom as noninterference over freedom as nonfrustration, so it is possible in parallel to argue for freedom as nondomination over freedom as noninterference. ...
doi:10.1086/660694
fatcat:g2vht5t6xrb3jpwpwkndephpde
A Theory of Noninterference for the π-Calculus
[chapter]
2005
Lecture Notes in Computer Science
We develop a theory of noninterference for a typed version of the πcalculus where types are used to assign secrecy levels to channels. ...
Furthermore, we characterize noninterference in terms of bisimulation-like (partial) equivalence relations in the style of a stream of similar studies for other process calculi (e.g., CCS and CryptoSPA ...
We further develop two quantifier-free characterizations of noninterference based on bisimulation-like (partial) equivalence relations. ...
doi:10.1007/11580850_2
fatcat:xlrmht6cqrfd7hzxvevhx3zzgu
Secure Information Flow for Concurrent Programs under Total Store Order
2012
2012 IEEE 25th Computer Security Foundations Symposium
Finally, we show that the original type system is in fact sound under TSO for programs that are free of data races. ...
We define a simple type system for possibilistic noninterference under SC and demonstrate that it is unsound under TSO. ...
A type system for possibilistic noninterference of TSO programs. ...
doi:10.1109/csf.2012.20
dblp:conf/csfw/VaughanM12
fatcat:kqoqrjmmlzfe3jdcznogzd6mei
Strategic Noninterference
[chapter]
2015
IFIP Advances in Information and Communication Technology
We also give a characterization of strategic noninterference through unwinding relations for specific subclasses of goals and for the simplified setting where a strategy is given as a parameter. ...
we call strategic noninterference. ...
By "deterministic", we essentially mean "quantifier-free". ...
doi:10.1007/978-3-319-18467-8_5
fatcat:fvims44th5farpdfunna4wda5q
Algorithmic Verification of Intransitive Noninterference for 3-domain Security Policies with a SAT Solver
2013
Applied Mathematics & Information Sciences
In this paper we propose an automated verification approach to checking intransitive noninterference for deterministic finite state systems. ...
For the case that there are no counterexamples, we also introduce the window induction proof method in order to avoid considering unnecessary iterations, and show that the induction proof can be performed ...
and for helpful comments that improved this paper. ...
doi:10.12785/amis/070521
fatcat:2bwo5p62yfgwxbi2aakkulcciq
Noninterference Technique for Measurement of Turbine Engine Compressor Blade Stress
1982
Journal of Aircraft
A secondary objective was to obtain operational experience with the prototype noninterference system for use in developing criteria for a full-scale (multistage compressor) noninterference system for routine ...
., ‘“‘Development of a Noninterference Technique for Measurement of Turbine Engine
J. ...
doi:10.2514/3.57357
fatcat:b3uhhpvww5gt3hg6krhdvdufre
Page 280 of Sage Public Administration Abstracts Vol. 26, Issue 2
[page]
1999
Sage Public Administration Abstracts
Philip Pettit claims that free- dom would be better understood as antipower than as noninterference. ...
Is there something wrong with ‘‘free action’’? Journal of Theoretical Politics (UK) 10(3):259-273, July 1998.
POLITICAL LIBERTY. POLITICAL PHILOSOPHY. RESEARCH TRENDS. ...
A Separation Logic for Enforcing Declarative Information Flow Control Policies
[chapter]
2014
Lecture Notes in Computer Science
In this paper, we present a program logic for proving that a program does not release information about sensitive data in an unintended way. ...
The logic is designed for reasoning about a C-like, imperative language with pointer manipulation and aliasing. We therefore make use of ideas from Separation Logic to reason about data in the heap. ...
This weakening of noninterference is interesting for two reasons. ...
doi:10.1007/978-3-642-54792-8_10
fatcat:ag73fllnxzbvnmi3276yvyz6au
Declassification: Dimensions and principles
2009
Journal of Computer Security
These principles shed light on existing definitions and may also serve as useful "sanity checks" for emerging models. ...
A principal security concern for systems permitting information release is whether this release is safe: is it possible that the attacker compromises the information release mechanism and extracts more ...
Myers and Pablo Giambiagi for fruitful discussions. ...
doi:10.3233/jcs-2009-0352
fatcat:c6ngeq6bbrgnvfdc6r3jjqz77a
« Previous
Showing results 1 — 15 out of 5,199 results