New opportunities for integrated formal methods
Formal methods have provided approaches for investigating software engineering
fundamentals and also have high potential to improve current practices in dependability …
fundamentals and also have high potential to improve current practices in dependability …
CSP and determinism in security modelling
AW Roscoe - Proceedings 1995 IEEE Symposium on Security …, 1995 - ieeexplore.ieee.org
We show how a variety of confidentiality properties can be expressed in terms of the
abstraction mechanisms that CSP provides. We argue that determinism of the abstracted low …
abstraction mechanisms that CSP provides. We argue that determinism of the abstracted low …
Classification of Security Properties: (Part I: Information Flow)
R Focardi, R Gorrieri - International School on Foundations of Security …, 2000 - Springer
In the recent years, many formalizations of security properties have been proposed, most of
which are based on different underlying models and are consequently difficult to compare. A …
which are based on different underlying models and are consequently difficult to compare. A …
Process algebra and non-interference
PYA Ryan, SA Schneider - Journal of Computer Security, 2001 - content.iospress.com
Various formulations of non-interference have been proposed to try to characterise the
absence of information flows in system or network. There is still no consensus in the …
absence of information flows in system or network. There is still no consensus in the …
The Semantics of Circus
J Woodcock, A Cavalcanti - International Conference of B and Z Users, 2002 - Springer
The Semantics of Circus Page 1 The Semantics of Circus Jim Woodcock1 and Ana Cavalcanti2
1 Oxford University Computing Laboratory Wolfson Building, Parks Road, Oxford, UK …
1 Oxford University Computing Laboratory Wolfson Building, Parks Road, Oxford, UK …
Modelling and verifying key-exchange protocols using CSP and FDR
AW Roscoe - Proceedings The Eighth IEEE Computer Security …, 1995 - ieeexplore.ieee.org
We discuss the issues involved in modelling and verifying key-exchange protocols within the
framework of CSP and its model-checking tool FDR. Expressing such protocols within a …
framework of CSP and its model-checking tool FDR. Expressing such protocols within a …
Towards development of secure systems using UMLsec
J Jürjens - … Conference on Fundamental Approaches to Software …, 2001 - Springer
We show how UML (the industry standard in object-oriented modelling) can be used to
express security requirements during system development. Using the extension …
express security requirements during system development. Using the extension …
CSP-OZ: a combination of Object-Z and CSP
C Fischer - Formal Methods for Open Object-based Distributed …, 1997 - Springer
In this paper we define a combination of Object-Z and CSP called CSP-OZ. The basic idea is
to define a CSP-semantics for every Object-Z class. Special care is taken to capture the …
to define a CSP-semantics for every Object-Z class. Special care is taken to capture the …
The compositional security checker: A tool for the verification of information flow security properties
R Focardi, R Gorrieri - IEEE Transactions on Software …, 1997 - ieeexplore.ieee.org
The Compositional Security Checker (CoSeC for short) is a semantic-based tool for the
automatic verification of some compositional information flow properties. The specifications …
automatic verification of some compositional information flow properties. The specifications …