scholarly journals Information Flow Security Certification for SPARK Programs

Author(s):  
Sandip Ghosal ◽  
R. K. Shyamasundar
2011 ◽  
Vol 39 (3) ◽  
pp. 189-200 ◽  
Author(s):  
Mohit Tiwari ◽  
Jason K. Oberg ◽  
Xun Li ◽  
Jonathan Valamehr ◽  
Timothy Levin ◽  
...  

2016 ◽  
Vol 24 (2) ◽  
pp. 181-234 ◽  
Author(s):  
Daniel Hedin ◽  
Luciano Bello ◽  
Andrei Sabelfeld

Author(s):  
Tobias Hamann ◽  
Mihai Herda ◽  
Heiko Mantel ◽  
Martin Mohr ◽  
David Schneider ◽  
...  

Author(s):  
Fredrik Seehusen ◽  
Ketil Stølen

We present a method for software development in which information flow security is taken into consideration from start to finish. Initially, the user of the method (i.e., a software developer) specifies the system architecture and selects a set of security requirements (in the form of secure information flow properties) that the system must adhere to. The user then specifies each component of the system architecture using UML inspired state machines, and refines/transforms these (abstract) state machines into concrete state machines. It is shown that if the abstract specification adheres to the security requirements, then so does the concrete one provided that certain conditions are satisfied.


Sign in / Sign up

Export Citation Format

Share Document