메뉴 건너뛰기




Volumn 20, Issue , 1999, Pages 80-94

Secrecy in programming-language semantics

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; CRYPTOGRAPHY; DATA PRIVACY; NETWORK PROTOCOLS; SECURITY OF DATA; SEMANTICS;

EID: 0005294877     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1571-0661(04)80068-9     Document Type: Conference Paper
Times cited : (5)

References (28)
  • 1
    • 84957668700 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Theoretical Aspects of Computer Software Springer-Verlag
    • Martín Abadi. Secrecy by typing in security protocols. In Theoretical Aspects of Computer Software, volume 1281 of Lecture Notes in Computer Science, pages 611-638. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1281 , pp. 611-638
    • Abadi, M.1
  • 3
    • 84878558984 scopus 로고    scopus 로고
    • April
    • Martín Abadi, Protection in programming-language translations, In: Proceedings of the 25th International Colloquium on Automata, Languages and Programming, July 1998, pages 868-883. Also Digital Equipment Corporation Systems Research Center report No. 154, April 1998.
    • (1998) Digital Equipment Corporation Systems Research Center Report No. 154 , vol.154
  • 7
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Martín Abadi and Andrew D. Gordon, A calculus for cryptographic protocols: The spi calculus, Information and Computation 148 (1999), An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998.
    • (1999) Information and Computation , vol.148
    • Abadi, M.1    Gordon, A.D.2
  • 8
    • 0003092378 scopus 로고    scopus 로고
    • An extended version appeared as January
    • Martín Abadi and Andrew D. Gordon, A calculus for cryptographic protocols: The spi calculus, Information and Computation 148 (1999), An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998.
    • (1998) Digital Equipment Corporation Systems Research Center Report No. 149
  • 9
    • 84945976575 scopus 로고    scopus 로고
    • Control flow analysis for the π-calculus
    • CONCUR '98: Concurrency Theory
    • Chiara Bodei, Pierpaolo Degano, Flemming Nielson, and Hanne Riis Nielson, Control flow analysis for the π-calculus, In: CONCUR '98: Concurrency Theory, Lecture Notes in Computer Science 1466 1998, pp. 84-98.
    • (1998) Lecture Notes in Computer Science , vol.1466 , pp. 84-98
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Riis Nielson, H.4
  • 14
    • 84957588448 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • Mathematics of Program Construction, 4th International Conference
    • K. Rustan M. Leino and Rajeev Joshi, A semantic approach to secure information flow, In: Mathematics of Program Construction, 4th International Conference, Lecture Notes in Computer Science 1422 (1998), pp. 254-271.
    • (1998) Lecture Notes in Computer Science , vol.1422 , pp. 254-271
    • Rustan, K.1    Leino, M.2    Joshi, R.3
  • 18
    • 44049113210 scopus 로고
    • A calculus of mobile processes, parts I and II
    • pages 41-77
    • Milner Robin, Parrow Joachim, Walker David. A calculus of mobile processes, parts I and II. Information and Computation. 100:1992;1-40. pages 41-77
    • (1992) Information and Computation , vol.100 , pp. 1-40
    • Milner, R.1    Parrow, J.2    Walker, D.3
  • 19
    • 0000046942 scopus 로고
    • A security flow control algorithm and its denotational semantics correctness proof
    • Mizuno Masaaki, Schmidt David. A security flow control algorithm and its denotational semantics correctness proof. Formal Aspects of Computing. 4:1992;727-754
    • (1992) Formal Aspects of Computing , vol.4 , pp. 727-754
    • Mizuno, M.1    Schmidt, D.2
  • 20
    • 0026188821 scopus 로고
    • Notions of computation and monads
    • Moggi Eugenio. Notions of computation and monads. Information and Control. 93:1991;55-92
    • (1991) Information and Control , vol.93 , pp. 55-92
    • Moggi, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.