{"title":"On requirements and security in a CCIS","authors":"C. O'Halloran","doi":"10.1109/CSFW.1992.236782","DOIUrl":null,"url":null,"abstract":"Any foundation for computer security needs to be tested to see whether it is strong enough to support a useful theory. In this paper a case study is presented which illustrates a particular foundation for confidentiality. A natural language confidentiality requirement is formalized in a calculus of information flow and analysed to assess possible conflicts.<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"73 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1992] Proceedings The Computer Security Foundations Workshop V","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSFW.1992.236782","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Any foundation for computer security needs to be tested to see whether it is strong enough to support a useful theory. In this paper a case study is presented which illustrates a particular foundation for confidentiality. A natural language confidentiality requirement is formalized in a calculus of information flow and analysed to assess possible conflicts.<>