메뉴 건너뛰기




Volumn 54, Issue , 2001, Pages 58-68

Information flow security in Mobile Ambients

Author keywords

Mobile Ambients; Security; Static Analysis

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTATIONAL METHODS; COMPUTER VIRUSES; CRYPTOGRAPHY; SECURITY OF DATA; SOFTWARE AGENTS; TELECOMMUNICATION SERVICES;

EID: 0011837296     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1571-0661(04)00235-X     Document Type: Conference Paper
Times cited : (5)

References (10)
  • 1
    • 84957807650 scopus 로고    scopus 로고
    • Safe ambients: Control flow analysis and security
    • P. Degano, F. Levi, C. Bodei. Safe Ambients: Control Flow Analysis and Security. In proceedings of ASIAN'00, LNCS 1961, 2000, pages 199-214.
    • (2000) Proceedings of ASIAN'00, LNCS , vol.1961 , pp. 199-214
    • Degano, P.1    Levi, F.2    Bodei, C.3
  • 2
    • 84937705299 scopus 로고    scopus 로고
    • Static analysis of processes for No read-up and no-write-down
    • In Proc. FoSSaCS'99, Springer-Verlag
    • C. Bodei, P. Degano, F. Nielson, and, H. R. Nielson. Static Analysis of Processes for No Read-Up and No-Write-Down. In In Proc. FoSSaCS'99, volume 1578 of Lecture Notes in Computer Science, pages 120-134, Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1578 , pp. 120-134
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Nielson, H.R.4
  • 4
    • 84947919695 scopus 로고    scopus 로고
    • Mobile ambients
    • Proc. FoSSaCS'98, Springer-Verlag
    • L. Cardelli and A. Gordon. "Mobile Ambients". In Proc. FoSSaCS'98, volume 1378 of Lecture Notes in Computer Science, pages 140-155, Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1378 , pp. 140-155
    • Cardelli, L.1    Gordon, A.2
  • 5
    • 84974776068 scopus 로고
    • "a Classification of Security Properties for Process Algebras"
    • Focardi R., Gorrieri R. "A Classification of Security Properties for Process Algebras" Journal of Computer Security. 3:(1):1995;5-33
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 6
    • 0001439194 scopus 로고    scopus 로고
    • "the Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
    • Focardi R., Gorrieri R. "The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Transactions on Software Engineering. Vol. 23:(No. 9):September 1997
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9
    • Focardi, R.1    Gorrieri, R.2
  • 8
    • 84957649493 scopus 로고    scopus 로고
    • Abstract interpretation of mobile ambients
    • Proc. Static Analysis Symposium SAS'99, Springer-Verlag
    • R. R. Hansen, J. G. Jensen, F. Nielson, and H. R. Nielson, Abstract Interpretation of Mobile Ambients. In Proc. Static Analysis Symposium SAS'99, volume 1694 of Lecture Notes in Computer Science, pages 134-148, Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1694 , pp. 134-148
    • Hansen, R.R.1    Jensen, J.G.2    Nielson, F.3    Nielson, H.R.4
  • 9
    • 84974577536 scopus 로고    scopus 로고
    • Information flow vs. Resource access in the asynchronous Pi-calculus
    • M. Hennessy, J. Riely. "Information Flow vs. Resource Access in the Asynchronous Pi-Calculus". ICALP 2000: 415-427.
    • ICALP 2000 , pp. 415-427
    • Hennessy, M.1    Riely, J.2
  • 10
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • G. Smith, D.M. Volpano, "Secure Information Flow in a Multi-Threaded Imperative Language". In Proc. of POPL 1998: 355-364.
    • Proc. of POPL 1998 , pp. 355-364
    • Smith, G.1    Volpano, D.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.