Abstract
As computer systems become more powerful and cheaper they permeate more of our everyday life. With this greater reliance on the automated processing and movement of our personal information comes a duty to demonstrate that computer systems are secure. Unfortuneately refinement which preserves “functional” properties does not necessarily preserve properties concerning the confidentiality of information. In this paper a way of describing confidentiality properties independently from “functional” properties is described. The paper goes on to show when “functionality” and confidentiality can be preserved by refinement.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Michael Barr and Charles Wells, Category theory for computing science Prentice Hall International, 1990.
Jim Davies and Steve Schneider, An Introduction to Timed CSP Technical Monograph PRG–75, Oxford University Computing Laboratory, Programming Research Group, 11 Keble Road, Oxford 0X1 3QD. ISBN 0902928–57–0, 1989.
J. A. Goguen and J. Meseguer, Security policies and security models, Proceedings 1982 IEEE Symposium on Security and Privacy, Oakland.
R. Goldblatt, Topoi, the categorial analysis of logic. North Holland, 1984
J. Graham-Cumming and J.W. Sanders, On the refinement of Non-Interference, Proceedings 1991 IEE Computer Security Foundations Workshop, IV. Franconia
C.A.R. Hoare, Communicating sequential processes, Prentice Hall International, ISBN 0–13–153289–8. 1985
J.L Jacob, Security specifications, Proceedings 1988 IEEE Symposium on Security and Privacy, Oakland.
J.L Jacob, Security refinement is not Ordinary refinement, Proceedings 1989 Workshop in Refinement Open University, Milton Keynes.
Specifying Security Properties, in C. A. R. Hoare, editor, Developments in Concurrency and Communication, (the proceedings of the Year of Programming Institute in Concurrent Programming), Addison Wesley, 1990
He Jifeng, Private communication 1989.
J. Meseguer & U. Montanari, Petri Nets Are Monoids: A New Algebraic Foundation for Net Theory. Proceedings of the IEEE Symposium On Logic In Computer Science 1988.
C. Morgan, Programming from Specifications, Prentice Hall International, 1990.
C.O’Halloran, A Calculus of Information Flow, Proceedings of the European symposium on research in computer security, Toulouse, France, October 1990.
C.O’Halloran, Category theory and information flow applied to computer security, DPhil. thesis,Oxford University (Submitted 1991). C.O’Halloran, A Calculus of Information Flow (specifying confidentiality requirements), RSRE Report No. 92001, 1992.
C.O’Halloran, Boots, a secure CCIS RSRE Report No. 92002, 1992.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1992 Springer-Verlag London
About this paper
Cite this paper
O’Halloran, C. (1992). Refinement and Confidentiality. In: Jones, C.B., Shaw, R.C., Denvir, T. (eds) 5th Refinement Workshop. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3550-0_7
Download citation
DOI: https://doi.org/10.1007/978-1-4471-3550-0_7
Publisher Name: Springer, London
Print ISBN: 978-3-540-19752-2
Online ISBN: 978-1-4471-3550-0
eBook Packages: Springer Book Archive