메뉴 건너뛰기




Volumn 22, Issue 1, 1996, Pages 53-67

A general theory of composition for a class of "possibilistic" properties

Author keywords

Computer security, security models, composition, information flow

Indexed keywords


EID: 0002426876     PISSN: 00985589     EISSN: None     Source Type: Journal    
DOI: 10.1109/32.481534     Document Type: Article
Times cited : (119)

References (20)
  • 1
    • 85031933412 scopus 로고    scopus 로고
    • "Composing specifications,"
    • J. W. de Bakker, W. P. de Roever, and G. Rosenberg, eds., Lecture Notes in Computer Science, vol. 430. Springer-Verlag, 1990.
    • M. Abadi and L. Lamport, "Composing specifications," Stepwise Refinement of Distributed Systems, J. W. de Bakker, W. P. de Roever, and G. Rosenberg, eds., Lecture Notes in Computer Science, vol. 430. Springer-Verlag, 1990.
    • Stepwise Refinement of Distributed Systems
    • Abadi, M.1    Lamport, L.2
  • 3
    • 0020299523 scopus 로고    scopus 로고
    • "Security policies and security models,"
    • 1982 IEEE Symp. Research in Security and Privacy. IEEE Press, 1982.
    • J. Goguen and J. Meseguer, "Security policies and security models," Proc. 1982 IEEE Symp. Research in Security and Privacy. IEEE Press, 1982.
    • Proc.
    • Goguen, J.1    Meseguer, J.2
  • 5
    • 84974759639 scopus 로고    scopus 로고
    • "Toward a mathematical foundation for information flow security,"
    • vol. 1, nos. 3-4, pp. 255-294,1992.
    • J. Gray, "Toward a mathematical foundation for information flow security," J. Computer Security, vol. 1, nos. 3-4, pp. 255-294,1992.
    • J. Computer Security
    • Gray, J.1
  • 6
    • 0024663847 scopus 로고    scopus 로고
    • "On the derivation of secure components,"
    • 1989 IEEE Symp. Research in Security and Privacy. IEEE Press, 1989.
    • J. Jacob, "On the derivation of secure components," Proc. 1989 IEEE Symp. Research in Security and Privacy. IEEE Press, 1989.
    • Proc.
    • Jacob, J.1
  • 8
    • 33747349821 scopus 로고    scopus 로고
    • "Specifications for multi-level security and a hook-up property,"
    • 1387 IEEE Symp. Research in Security and Privacy. IEEE Pre'ss, 1987.
    • D. McCullough, "Specifications for multi-level security and a hook-up property," Proc. 1387 IEEE Symp. Research in Security and Privacy. IEEE Pre'ss, 1987.
    • Proc.
    • McCullough, D.1
  • 9
    • 0025211594 scopus 로고    scopus 로고
    • "The specification and modeling of computer security,"
    • vol. 23, no. 1, pp. 9-16,1990.
    • J. McLean, "The specification and modeling of computer security," Computer, vol. 23, no. 1, pp. 9-16,1990.
    • Computer
    • McLean, J.1
  • 10
    • 0025139568 scopus 로고    scopus 로고
    • "Security models and information flow,"
    • 1990 IEEE Symp. Research in Security and Privacy. IEEE Press, 1990.
    • J. McLean, "Security models and information flow," Proc. 1990 IEEE Symp. Research in Security and Privacy. IEEE Press, 1990.
    • Proc.
    • McLean, J.1
  • 11
    • 84974747891 scopus 로고    scopus 로고
    • "Proving noninterference and functional correctness using traces,"
    • vol. 1, no. 1, pp. 37-57,1992.
    • [II] J. McLean, "Proving noninterference and functional correctness using traces," J. Computer Security, vol. 1, no. 1, pp. 37-57,1992.
    • J. Computer Security
    • McLean, J.1
  • 13
    • 0028058408 scopus 로고    scopus 로고
    • "A general theory of composition for trace sets closed under selective interleaving functions,"
    • 1994 IEEE Symp. Research in Security and Privacy. IEEE Press, 1994.
    • J. McLean, "A general theory of composition for trace sets closed under selective interleaving functions," Proc. 1994 IEEE Symp. Research in Security and Privacy. IEEE Press, 1994.
    • Proc.
    • McLean, J.1
  • 15
    • 33747342753 scopus 로고    scopus 로고
    • "Using traces based on procedure calls to reason about composability,"
    • 1992 IEEE Symp. Research in Security and Privacy. IEEE Press, 1992.
    • C. Meadows, "Using traces based on procedure calls to reason about composability," Proc. 1992 IEEE Symp. Research in Security and Privacy. IEEE Press, 1992.
    • Proc.
    • Meadows, C.1
  • 18
    • 0025135716 scopus 로고    scopus 로고
    • "Information flow in nondeterministic systems,"
    • 1990 IEEE Symp. Research in Security and Priva. J.'IEEE Press, 1990.
    • J.T. Wittbold and D. Johnson, "Information flow in nondeterministic systems," Proc. 1990 IEEE Symp. Research in Security and Priva. J.'IEEE Press, 1990.
    • Proc.
    • Wittbold, J.T.1    Johnson, D.2
  • 20
    • 33747334980 scopus 로고    scopus 로고
    • "A model of information,"
    • 1 Computer Security ConJ., Gaithersburg, Md., 1986.
    • I. Sutherland, "A model of information," Proc. Ninth Nat'1 Computer Security ConJ., Gaithersburg, Md., 1986.
    • Proc. Ninth Nat'
    • Sutherland, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.