8.2. CONCLUSIONS 93
8.3. FUTURE WORK 93
Appendix A - Proof of Stability for Various Security Properties................................94
Appendix B - Proof that º is an equivalence relation .................................................96
List of References ........................................................................................................97
List of References
[Abadi & Lamport90] Martin Abadi and Leslie Lamport. “Composing Specifications,” Technical Report 66, Digital Equipment Corporation Systems Research Center, Palo Alto, CA, 1990.
[Allen91] P.G. Allen. “A Comparison of Non-Interference and NonDeducibility using CSP,” Proceedings of the Computer Security Foundations Workshop IV, pages 43-54. IEEE Press. June 1991.
[Alpern & Schneider85] Bowen Alpern and Fred Schneider. “Defining Liveness,”Informatin Processing Letters, 21(4), pages 181-185. October 1985.
[Bell & LaPadula75] D. Elliott Bell and Leonard J. LaPadula. “Secure Computer Systems: Mathematical Foundations,” Technical Report TR-2547, MITRE Corporation, Bedford, MA, 1975]
[Bevier & Young94] William R. Bevier and William D. Young. “A State-Based Approach to Noninterference,” Proceedings of the Computer Security Foundations Workshop VII, pages 11-21.IEEE Computer Society, June 1994.