Refinement and Confidentiality

  • Colin O’Halloran
Part of the Workshops in Computing book series (WORKSHOPS COMP.)


As computer systems become more powerful and cheaper they permeate more of our everyday life. With this greater reliance on the automated processing and movement of our personal information comes a duty to demonstrate that computer systems are secure. Unfortuneately refinement which preserves “functional” properties does not necessarily preserve properties concerning the confidentiality of information. In this paper a way of describing confidentiality properties independently from “functional” properties is described. The paper goes on to show when “functionality” and confidentiality can be preserved by refinement.


Categorical Product Natural Transformation Category Theory Initial Object Concrete Category 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Michael Barr and Charles Wells, Category theory for computing science Prentice Hall International, 1990.Google Scholar
  2. [2]
    Jim Davies and Steve Schneider, An Introduction to Timed CSP Technical Monograph PRG–75, Oxford University Computing Laboratory, Programming Research Group, 11 Keble Road, Oxford 0X1 3QD. ISBN 0902928–57–0, 1989.Google Scholar
  3. [3]
    J. A. Goguen and J. Meseguer, Security policies and security models, Proceedings 1982 IEEE Symposium on Security and Privacy, Oakland.Google Scholar
  4. [4]
    R. Goldblatt, Topoi, the categorial analysis of logic. North Holland, 1984Google Scholar
  5. [5]
    J. Graham-Cumming and J.W. Sanders, On the refinement of Non-Interference, Proceedings 1991 IEE Computer Security Foundations Workshop, IV. Franconia Google Scholar
  6. [6]
    C.A.R. Hoare, Communicating sequential processes, Prentice Hall International, ISBN 0–13–153289–8. 1985Google Scholar
  7. [7]
    J.L Jacob, Security specifications, Proceedings 1988 IEEE Symposium on Security and Privacy, Oakland.Google Scholar
  8. [8]
    J.L Jacob, Security refinement is not Ordinary refinement, Proceedings 1989 Workshop in Refinement Open University, Milton Keynes.Google Scholar
  9. [9]
    Specifying Security Properties, in C. A. R. Hoare, editor, Developments in Concurrency and Communication, (the proceedings of the Year of Programming Institute in Concurrent Programming), Addison Wesley, 1990Google Scholar
  10. [10]
    He Jifeng, Private communication 1989.Google Scholar
  11. [11]
    J. Meseguer & U. Montanari, Petri Nets Are Monoids: A New Algebraic Foundation for Net Theory. Proceedings of the IEEE Symposium On Logic In Computer Science 1988.Google Scholar
  12. [12]
    C. Morgan, Programming from Specifications, Prentice Hall International, 1990.Google Scholar
  13. [13]
    C.O’Halloran, A Calculus of Information Flow, Proceedings of the European symposium on research in computer security, Toulouse, France, October 1990.Google Scholar
  14. [14]
    C.O’Halloran, Category theory and information flow applied to computer security, DPhil. thesis,Oxford University (Submitted 1991). C.O’Halloran, A Calculus of Information Flow (specifying confidentiality requirements), RSRE Report No. 92001, 1992.Google Scholar
  15. [15]
    C.O’Halloran, Boots, a secure CCIS RSRE Report No. 92002, 1992.Google Scholar

Copyright information

© Springer-Verlag London 1992

Authors and Affiliations

  • Colin O’Halloran
    • 1
  1. 1.DRAMalvern, Worcs.UK

Personalised recommendations