메뉴 건너뛰기




Volumn 20, Issue 7, 1977, Pages 504-513

Certification of Programs for Secure Information Flow

Author keywords

confinement; information flow; lattice; program certification; protection; security; security classes

Indexed keywords

COMPUTER OPERATING SYSTEMS - PROGRAM COMPILERS;

EID: 0017517624     PISSN: 00010782     EISSN: 15577317     Source Type: Journal    
DOI: 10.1145/359636.359712     Document Type: Article
Times cited : (778)

References (31)
  • 2
    • 84945710932 scopus 로고
    • COPS-A protection mechanism for computer systems
    • Ph.D. Diss., U. of Wash., Seattle, Wash., July
    • Andrews, G.R. COPS-A protection mechanism for computer systems. Ph.D. Diss., U. of Wash., Seattle, Wash., July 1974.
    • (1974)
    • Andrews, G.R.1
  • 3
    • 84971176319 scopus 로고    scopus 로고
    • Foundations
    • ESD-TR-73-278, The MITRE Corp., Bedford, Mass
    • Foundations, Vol. 1-III. ESD-TR-73-278, The MITRE Corp., Bedford, Mass.
    • , vol.1-3
  • 4
    • 0004190631 scopus 로고
    • Amer. Math. Soc. Col. Pub. XXV, Amer. Math. Soc., Providence, R.I., 3rd ed.
    • Birkhoff, G. Lattice Theory. Amer. Math. Soc. Col. Pub. XXV, Amer. Math. Soc., Providence, R.I., 3rd ed., 1967.
    • (1967) Lattice Theory
    • Birkhoff, G.1
  • 5
    • 84976817842 scopus 로고
    • Selectively confined subsystems. Proc. Int. Workshop on Protection in Operating Systems
    • France, Aug
    • Denning, D.E., Denning, P.J., and Graham, G.S. Selectively confined subsystems. Proc. Int. Workshop on Protection in Operating Systems, IRIA-Laboria, France, Aug. 1974, pp. 55-61.
    • (1974) IRIA-Laboria , pp. 55-61
    • Denning, D.E.1    Denning, P.J.2    Graham, G.S.3
  • 6
    • 0041684496 scopus 로고
    • Secure information flow in computer systems
    • Ph.D. Th., Comptr. Sci. Dep., Purdue U., W. Lafayette, Ind., May
    • Denning, D.E. Secure information flow in computer systems. Ph.D. Th., Comptr. Sci. Dep., Purdue U., W. Lafayette, Ind., May 1975.
    • (1975)
    • Denning, D.E.1
  • 7
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • Denning, D.E. A lattice model of secure information flow. Comm. ACM 19, 5 (May 1976), 236-243.
    • (1976) Comm. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 8
    • 77954994485 scopus 로고
    • On the derivation of lattice structured information flow policies
    • Tech. Rep. TR-179 Purdue U., W. Lafayette, Ind., March
    • Denning, D.E. On the derivation of lattice structured information flow policies. Tech. Rep. TR-179, Dep. of Comptr. Sci., Purdue U., W. Lafayette, Ind., March 1976.
    • (1976) Dep. of Comptr. Sci.
    • Denning, D.E.1
  • 9
    • 0012779604 scopus 로고
    • Information protection systems
    • Ph.D. Diss., Comptr. Lab., U. of Cambridge, England
    • Fenton, J.S. Information protection systems. Ph.D. Diss., Comptr. Lab., U. of Cambridge, England, 1973.
    • (1973)
    • Fenton, J.S.1
  • 10
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • Fenton, J.S. Memoryless subsystems. Comptr. J. 17, 2 (May 1974), 143-147.
    • (1974) Comptr. J. , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 11
    • 39149137077 scopus 로고
    • An abstract computer model demonstrating directional information flow
    • U. of Cambridge, Cambridge, England
    • Fenton, J.S. An abstract computer model demonstrating directional information flow. U. of Cambridge, Cambridge, England, 1974.
    • (1974)
    • Fenton, J.S.1
  • 12
    • 0016623975 scopus 로고
    • Exception handling: Issues and a proposed notation
    • Dec
    • Goodenough, J.B. Exception handling: Issues and a proposed notation. Comm. ACM 18, 12 (Dec. 1975), 683-696.
    • (1975) Comm. ACM , vol.18 , Issue.12 , pp. 683-696
    • Goodenough, J.B.1
  • 13
    • 84871374295 scopus 로고
    • Memoryless execution: A programmer's viewpoint
    • IBM Tech. Rep. 025, IBM Israeli Scientific Ctr., Haifa, March
    • Gat, I., and Saal, H.J. Memoryless execution: A programmer's viewpoint. IBM Tech. Rep. 025, IBM Israeli Scientific Ctr., Haifa, March 1975.
    • (1975)
    • Gat, I.1    Saal, H.J.2
  • 14
    • 84942812332 scopus 로고
    • Protection principles and practice
    • SJCC AFIPS Press, Montvale, N.J.
    • Graham, G.S., and Denning, P.J. Protection principles and practice. Proc. AFIPS 1972 SJCC, Vol. 40, AFIPS Press, Montvale, N.J., pp. 417-429.
    • (1972) Proc. AFIPS , vol.40 , pp. 417-429
    • Graham, G.S.1    Denning, P.J.2
  • 15
    • 0010722692 scopus 로고
    • Compiler Construction for Digital Computers
    • Wiley, New York
    • Gries, D. Compiler Construction for Digital Computers, Wiley, New York, 1971.
    • (1971)
    • Gries, D.1
  • 16
    • 84999217852 scopus 로고
    • On protection in operating systems
    • Proc. Fifth Symp. on Operating Systems Principles, Operating Syst. Rev. (ACM SIGOPS Newsletter) Nov
    • Harrison, M.A., Ruzzo, W.L., and Ullman, J.D. On protection in operating systems. Proc. Fifth Symp. on Operating Systems Principles, Operating Syst. Rev. (ACM SIGOPS Newsletter) 9, 5 (Nov. 1975), 14-24.
    • (1975) , vol.9 , Issue.5 , pp. 14-24
    • Harrison, M.A.1    Ruzzo, W.L.2    Ullman, J.D.3
  • 17
    • 84976843670 scopus 로고
    • IBM
    • Rep. No. GC28-8201-3, IBM Systems Reference Library
    • IBM. System/360 PL/I (F) Language Reference Manual. Rep. No. GC28-8201-3, IBM Systems Reference Library, 1971.
    • (1971) System/360 PL/I (F) Language Reference Manual
  • 18
    • 3743154925 scopus 로고
    • Protection in programmed systems
    • Ph.D. Th., Carnegie-Mellon U., Pittsburgh, Pa., June
    • Jones, A.K. Protection in programmed systems. Ph.D. Th., Carnegie-Mellon U., Pittsburgh, Pa., June 1973.
    • (1973)
    • Jones, A.K.1
  • 19
    • 84987646334 scopus 로고
    • The enforcement of security policies for computation
    • Proc. Fifth Symp. on Operating Systems Principles, Operating Syst. Rev. (ACM SIGOPS Newsletter) (Nov.
    • Jones, A.K., and Lipton, R.J. The enforcement of security policies for computation. Proc. Fifth Symp. on Operating Systems Principles, Operating Syst. Rev. (ACM SIGOPS Newsletter) 9, 5 (Nov. 1975), 197-206.
    • (1975) , vol.9 , Issue.5 , pp. 197-206
    • Jones, A.K.1
  • 20
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Oct
    • Lampson, B.W. A note on the confinement problem. Comm. ACM 16, 10 (Oct. 1973), 613-615.
    • (1973) Comm. ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 21
    • 84945721946 scopus 로고
    • A comment on the confinement problem
    • Proc. Fifth Symp. on Operating Systems Principles, Operating Syst. Rev. (ACM SIGOPS Newsletter) Nov
    • Lipner, S.B. A comment on the confinement problem. Proc. Fifth Symp. on Operating Systems Principles, Operating Syst. Rev. (ACM SIGOPS Newsletter) 9, 5 (Nov. 1975), 192-196.
    • (1975) , vol.9 , Issue.5 , pp. 192-196
    • Lipner, S.B.1
  • 22
    • 84869113956 scopus 로고
    • Object code optimization
    • Jan
    • Lowry, E.S., and Medlock, C.W. Object code optimization. Comm. ACM 12, 1 (Jan. 1969), 13-22.
    • (1969) Comm. ACM , vol.12 , Issue.1 , pp. 13-22
    • Lowry, E.S.1
  • 23
    • 0016951438 scopus 로고
    • Security Kernel Validation in Practice
    • May
    • Millen, J.K. Security Kernel Validation in Practice. Comm. ACM 19, 5 (May 1976), 243-250.
    • (1976) Comm. ACM , vol.19 , Issue.5 , pp. 243-250
    • Millen, J.K.1
  • 25
    • 84976861631 scopus 로고
    • Potential capabilities in ALGOL-like programs
    • TR 74-211 Cornell U., Ithaca, N.Y., Sept
    • Moore, C.G. III. Potential capabilities in ALGOL-like programs. TR 74-211, Dep. Comptr. Sci., Cornell U., Ithaca, N.Y., Sept. 1974.
    • (1974) Dep. Comptr. Sci.
    • Moore, C.G.1
  • 26
    • 84938001503 scopus 로고
    • Making computers keep secrets
    • Ph.D. Th., MAC-TR-115, Project Mac, M.I.T., Cambridge, Mass., Feb.
    • Rotenberg, L.J. Making computers keep secrets. Ph.D. Th., MAC-TR-115, Project Mac, M.I.T., Cambridge, Mass., Feb. 1974.
    • (1974)
    • Rotenberg, L.J.1
  • 27
    • 3743140411 scopus 로고
    • Cooperation of mutually suspicious subsystems in a computer utility
    • Ph.D. Th., MAC-TR-104, Project MAC, Sept.
    • Schroeder, M.D. Cooperation of mutually suspicious subsystems in a computer utility. Ph.D. Th., MAC-TR-104, Project MAC, Sept. 1972.
    • (1972)
    • Schroeder, M.D.1
  • 29
    • 0016726281 scopus 로고
    • Structured specification of a security kernel
    • on Reliable Software, SIGPLAN Notices (ACM) June
    • Walter, K.G., et al. Structured specification of a security kernel. Proc. Int. Conf. on Reliable Software, SIGPLAN Notices (ACM) 10, 6 (June 1975), 285-293.
    • (1975) Proc. Int. Conf. , vol.10 , Issue.6 , pp. 285-293
    • Walter, K.G.1
  • 30
    • 4544284713 scopus 로고
    • Security controls in the ADEPT-50 time-sharing system
    • AFIPS Press, Montvale, N.J.
    • Weissman, C. Security controls in the ADEPT-50 time-sharing system. Proc. AFIPS 1969 FJCC, Vol. 35, AFIPS Press, Montvale, N.J., pp. 119-133.
    • (1969) AFIPS , vol.35 , pp. 119-133
    • Weissman, C.1
  • 31
    • 0015197891 scopus 로고
    • The programming language Pascal
    • Wirth, N. The programming language Pascal. Acta Informatica 1, 1 (1971), 35-63.
    • (1971) Acta Informatica , vol.1 , Issue.1 , pp. 35-63
    • Wirth, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.