The complexity of synchronous notions of information flow security

Franck Cassez*, Ron Van Der Meyden, Chenyi Zhang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

4 Citations (Scopus)

Abstract

The paper considers the complexity of verifying that a finite state system satisfies a number of definitions of information flow security. The systems model considered is one in which agents operate synchronously with awareness of the global clock. This enables timing based attacks to be captured, whereas previous work on this topic has dealt primarily with asynchronous systems. Versions of the notions of nondeducibility on inputs, nondeducibility on strategies, and an unwinding based notion are formulated for this model. All three notions are shown to be decidable, and their computational complexity is characterised.

Original languageEnglish
Title of host publicationFoundations of Software Science and Computational Structures
Subtitle of host publication13th International Conference, FOSSACS 2010 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010 Paphos, Cyprus, March 20-28, 2010, Proceedings
EditorsLuke Ong
Place of PublicationBerlin; Heidelberg
PublisherSpringer, Springer Nature
Pages282-296
Number of pages15
ISBN (Print)3642120318, 9783642120312
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event13th International Conference on the Foundations of Software Science and Computational Structures, FoSSaCS 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010 - Paphos, Cyprus
Duration: 20 Mar 201028 Mar 2010

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume6014
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other13th International Conference on the Foundations of Software Science and Computational Structures, FoSSaCS 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010
CountryCyprus
CityPaphos
Period20/03/1028/03/10

Fingerprint Dive into the research topics of 'The complexity of synchronous notions of information flow security'. Together they form a unique fingerprint.

Cite this