Skip to main content

Refinement and Confidentiality

  • Conference paper
5th Refinement Workshop

Part of the book series: Workshops in Computing ((WORKSHOPS COMP.))

Abstract

As computer systems become more powerful and cheaper they permeate more of our everyday life. With this greater reliance on the automated processing and movement of our personal information comes a duty to demonstrate that computer systems are secure. Unfortuneately refinement which preserves “functional” properties does not necessarily preserve properties concerning the confidentiality of information. In this paper a way of describing confidentiality properties independently from “functional” properties is described. The paper goes on to show when “functionality” and confidentiality can be preserved by refinement.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Michael Barr and Charles Wells, Category theory for computing science Prentice Hall International, 1990.

    Google Scholar 

  2. Jim Davies and Steve Schneider, An Introduction to Timed CSP Technical Monograph PRG–75, Oxford University Computing Laboratory, Programming Research Group, 11 Keble Road, Oxford 0X1 3QD. ISBN 0902928–57–0, 1989.

    Google Scholar 

  3. J. A. Goguen and J. Meseguer, Security policies and security models, Proceedings 1982 IEEE Symposium on Security and Privacy, Oakland.

    Google Scholar 

  4. R. Goldblatt, Topoi, the categorial analysis of logic. North Holland, 1984

    Google Scholar 

  5. J. Graham-Cumming and J.W. Sanders, On the refinement of Non-Interference, Proceedings 1991 IEE Computer Security Foundations Workshop, IV. Franconia

    Google Scholar 

  6. C.A.R. Hoare, Communicating sequential processes, Prentice Hall International, ISBN 0–13–153289–8. 1985

    Google Scholar 

  7. J.L Jacob, Security specifications, Proceedings 1988 IEEE Symposium on Security and Privacy, Oakland.

    Google Scholar 

  8. J.L Jacob, Security refinement is not Ordinary refinement, Proceedings 1989 Workshop in Refinement Open University, Milton Keynes.

    Google Scholar 

  9. Specifying Security Properties, in C. A. R. Hoare, editor, Developments in Concurrency and Communication, (the proceedings of the Year of Programming Institute in Concurrent Programming), Addison Wesley, 1990

    Google Scholar 

  10. He Jifeng, Private communication 1989.

    Google Scholar 

  11. J. Meseguer & U. Montanari, Petri Nets Are Monoids: A New Algebraic Foundation for Net Theory. Proceedings of the IEEE Symposium On Logic In Computer Science 1988.

    Google Scholar 

  12. C. Morgan, Programming from Specifications, Prentice Hall International, 1990.

    Google Scholar 

  13. C.O’Halloran, A Calculus of Information Flow, Proceedings of the European symposium on research in computer security, Toulouse, France, October 1990.

    Google Scholar 

  14. C.O’Halloran, Category theory and information flow applied to computer security, DPhil. thesis,Oxford University (Submitted 1991). C.O’Halloran, A Calculus of Information Flow (specifying confidentiality requirements), RSRE Report No. 92001, 1992.

    Google Scholar 

  15. C.O’Halloran, Boots, a secure CCIS RSRE Report No. 92002, 1992.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1992 Springer-Verlag London

About this paper

Cite this paper

O’Halloran, C. (1992). Refinement and Confidentiality. In: Jones, C.B., Shaw, R.C., Denvir, T. (eds) 5th Refinement Workshop. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3550-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-3550-0_7

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-19752-2

  • Online ISBN: 978-1-4471-3550-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics