首页> 外文会议>International School on Engineering Trustworthy Software Systems >Program Refinement, Perfect Secrecy and Information Flow
【24h】

Program Refinement, Perfect Secrecy and Information Flow

机译:程序精制,完美保密和信息流程

获取原文

摘要

"Classical" proofs of secure systems are based on reducing the hardness of one problem (defined by the protocol) to that of another (a known difficult computational problem). In standard program development [1,3,14] this "comparative approach" features in stepwise refinement: describe a system as simply as possible so that it has exactly the required properties and then apply sound refinement rules to obtain an implementation comprising specific algorithms and data-structures. More recently the stepwise refinement method has been extended to include "information flow" properties as well as functional properties, thus supporting proofs about secrecy within a program refinement method. In this paper we review the security-by-refinement approach and illustrate how it can be used to give an elementary treatment of some well known security principles.
机译:安全系统的“经典”证明基于降低一个问题的硬度(由协议定义)到另一个问题(由协议定义)(已知的困难计算问题)。在标准程序开发[1,3,14]中,这种“比较方法”在逐步改进中的特征:描述一个系统,尽可能简单地,使其完全是所需的属性,然后应用声音细化规则以获得包括特定算法的实现实现数据结构。最近,逐步改进方法已经扩展到包括“信息流”属性以及功能性质,从而支持节目细化方法内的保密的证据。在本文中,我们审查了逐种细化方法,并说明了如何用于提供一些众所周知的安全原则的基本处理。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号