Jan. 23, 2023, 2:10 a.m. | Roberto Gorrieri

cs.CR updates on arXiv.org arxiv.org

Information flow security properties were defined some years ago (see, e.g.,
the surveys \cite{FG01,Ry01}) in terms of suitable equivalence checking
problems. These definitions were provided by using sequential models of
computations (e.g., labeled transition systems \cite{GV15}), and interleaving
behavioral equivalences (e.g., bisimulation equivalence \cite{Mil89}). More
recently, the distributed model of Petri nets has been used to study
non-interference in \cite{BG03,BG09,BC15}, but also in these papers an
interleaving semantics was used. We argue that in order to capture all the
relevant …

defined distributed flow flow security information interference non order papers problems security study surveys systems terms transition

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Engineer, Incident Response

@ Databricks | Remote - Netherlands

Associate Vulnerability Engineer - Mid-Atlantic region (Part-Time)

@ GuidePoint Security LLC | Remote in VA, MD, PA, NC, DE, NJ, or DC

Data Security Architect

@ Accenture Federal Services | Washington, DC

Identity Security Administrator

@ SailPoint | Pune, India