DocumentCode
2010132
Title
Information Flow in Systems with Schedulers
Author
Meyden, Ron van der ; Zhang, Chenyi
fYear
2008
fDate
23-25 June 2008
Firstpage
301
Lastpage
312
Abstract
The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with schedulers, which require synchronous variants of these definitions. In particular, it studies the dependence of these variant definitions of security on implementation details of the scheduler. Such independence is shown to hold for synchronous variants of trace-based definitions, but not for bisimulation-based definitions. Stronger versions of the bisimulation-based definitions are proposed that recover implementation-independence.
Keywords
Algebra; Australia Council; Carbon capture and storage; Clocks; Computational modeling; Computer security; Information security; Kernel; National security; Processor scheduling; information flow; noninterference; scheduler;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Foundations Symposium, 2008. CSF '08. IEEE 21st
Conference_Location
Pittsburgh, PA, USA
ISSN
1940-1434
Print_ISBN
978-0-7695-3182-3
Type
conf
DOI
10.1109/CSF.2008.13
Filename
4556694
Link To Document