Skip to main content

previous disabled Page of 6
and
  1. No Access

    Chapter

    Benign Interaction of Security Domains

    Whenever data is communicated outside a security domain there is the risk that it may influence data coming back in a way that is not permitted by the security domain. This may arise when different security do...

    Flemming Nielson, René Rydhof Hansen, Hanne Riis Nielson in Protocols, Strands, and Logic (2021)

  2. No Access

    Chapter

    Secure Guarded Commands

    We develop a lightweight approach to information flow control that interacts with the use of cryptographic schemes. The language is a version of Dijkstra’s Guarded Commands language extended with parallelism, ...

    Flemming Nielson, Hanne Riis Nielson in From Lambda Calculus to Cybersecurity Thro… (2020)

  3. No Access

    Chapter and Conference Paper

    Adaptive Security Policies

    We develop an approach to security of adaptive agents that is based on respecting the local security policies of agents rather than imposing a global security policy on all agents. In short, an agent can be as...

    Flemming Nielson, René Rydhof Hansen in Leveraging Applications of Formal Methods,… (2020)

  4. No Access

    Book and Conference Proceedings

    Coordination Models and Languages

    21st IFIP WG 6.1 International Conference, COORDINATION 2019, Held as Part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019, Kongens Lyngby, Denmark, June 17–21, 2019, Proceedings

    Hanne Riis Nielson, Emilio Tuosto in Lecture Notes in Computer Science (2019)

  5. No Access

    Chapter

    Guarded Commands

    Programs are written in programming languages and in this chapter we are going to show how we can construct program graphs for all programs in a programming language. The programming language will be the (prob...

    Flemming Nielson, Hanne Riis Nielson in Formal Methods (2019)

  6. No Access

    Chapter

    Program Analysis

    Program analysis is an approach to finding properties of programs and it can be fully automated unlike program verification. The price to pay is that we can only express approximate behaviours of programs and ...

    Flemming Nielson, Hanne Riis Nielson in Formal Methods (2019)

  7. No Access

    Chapter

    Model Checking

    Model checking is an approach to finding properties of programs. It can be fully automated but its efficiency is usually not as good as that of program analysis. The gain is that the precision is closer to tha...

    Flemming Nielson, Hanne Riis Nielson in Formal Methods (2019)

  8. No Access

    Chapter

    Concurrency

    So far we have been looking at individual programs running on their own. In this chapter we will illustrate how to deal with concurrently running programs that may communicate with one another. Our main focus ...

    Flemming Nielson, Hanne Riis Nielson in Formal Methods (2019)

  9. No Access

    Chapter

    Program Graphs

    Sometimes we need to be very precise about the behaviour of our programs – there may be constructs in our programming language that are subtle or novel. Semantics is the part of Computer Science that deals wit...

    Flemming Nielson, Hanne Riis Nielson in Formal Methods (2019)

  10. No Access

    Chapter

    Program Verification

    It is essential that programs are correct – meaning that their behaviour is as we intend. For example, a sorting routine should indeed sort the array given as input. To verify the correctness of programs one ofte...

    Flemming Nielson, Hanne Riis Nielson in Formal Methods (2019)

  11. No Access

    Chapter

    Language-Based Security

    Security is becoming increasingly important and formal methods offer powerful techniques for ensuring it. There are three important components in security: Confidentiality, meaning that private data is not made p...

    Flemming Nielson, Hanne Riis Nielson in Formal Methods (2019)

  12. No Access

    Chapter

    Procedures

    Procedures (or functions) are found in most programming languages and provide a means for reusing code in a number of programming tasks. In this chapter we will illustrate how to add procedures to the Guarded ...

    Flemming Nielson, Hanne Riis Nielson in Formal Methods (2019)

  13. No Access

    Chapter

    Multi-valued Logic for Static Analysis and Model Checking

    We extend Alternation-Free Least Fixed Point Logic to be based on Belnap logic, while maintaining the close correspondence between static analysis and model checking pioneered by Bernhard Steffen, and opening ...

    Flemming Nielson, Hanne Riis Nielson in Models, Mindsets, Meta: The What, the How,… (2019)

  14. No Access

    Chapter

    Lightweight Information Flow

    We develop a type system for identifying the information flow between variables in a program in the Guarded Commands language. First we characterise the types of information flow that may arise between variables ...

    Flemming Nielson, Hanne Riis Nielson in Models, Languages, and Tools for Concurren… (2019)

  15. No Access

    Chapter and Conference Paper

    Process-Local Static Analysis of Synchronous Processes

    We develop a modular approach to statically analyse imperative processes communicating by synchronous message passing. The approach is modular in that it only needs to analyze one process at a time, but will i...

    Jan Midtgaard, Flemming Nielson, Hanne Riis Nielson in Static Analysis (2018)

  16. Chapter and Conference Paper

    Secure Information Release in Timed Automata

    One of the key demands of cyberphysical systems is that they meet their safety goals. Timed automata has established itself as a formalism for modeling and analyzing the real-time safety aspects of cyberphysical ...

    Panagiotis Vasilikos, Flemming Nielson in Principles of Security and Trust (2018)

  17. No Access

    Chapter

    Information Flow for Timed Automata

    One of the key demands of cyberphysical systems is that they meet their safety goals. Timed Automata has established itself as a formalism for modelling and analysing the real-time safety aspects of cyberphysical...

    Flemming Nielson, Hanne Riis Nielson in Models, Algorithms, Logics and Tools (2017)

  18. Chapter and Conference Paper

    Enforcing Availability in Failure-Aware Communicating Systems

    Choreographic programming is a programming-language design approach that drives error-safe protocol development in distributed systems. Motivated by challenging scenarios in Cyber-Physical Systems (CPS), we st...

    Hugo A. López, Flemming Nielson in Formal Techniques for Distributed Objects,… (2016)

  19. No Access

    Chapter and Conference Paper

    Disjunctive Information Flow for Communicating Processes

    The security validation of practical computer systems calls for the ability to specify and verify information flow policies that are dependent on data content. Such policies play an important role in concurren...

    **meng Li, Flemming Nielson, Hanne Riis Nielson, **nyu Feng in Trustworthy Global Computing (2016)

  20. No Access

    Chapter and Conference Paper

    Towards Static Analysis of Policy-Based Self-adaptive Computing Systems

    For supporting the design of self-adaptive computing systems, the PSCEL language offers a principled approach that relies on declarative definitions of adaptation and authorisation policies enforced at runtime...

    Andrea Margheri, Hanne Riis Nielson in Leveraging Applications of Formal Methods,… (2016)

previous disabled Page of 6