A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Tracking Dependent Information Flows
2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy
Ensuring the compliance of developed software with security requirements is a challenging task due to imprecision on the security guidelines definition, and to the lack of automatic and formal means to lead this verification. In this paper, we present our approach that aims at integrating the formal specification and verification of security guidelines in early stages of the development life cycle by combining the model checking together with information flow analysis. We formally specify
doi:10.5220/0006209301790189
dblp:conf/icissp/ZhiouaRAKS17
fatcat:owzxqzjgi5axndvvcu2rcqtjcm