메뉴 건너뛰기




Volumn 10, Issue 3, 1992, Pages 226-264

A Logic for Reasoning About Security

Author keywords

composition knowledge; integrity; logic; obligation; permission; policy; possible worlds; secrecy; security; time

Indexed keywords

COMPUTER OPERATING SYSTEMS; DATA PROCESSING; DATABASE SYSTEMS; FORMAL LANGUAGES; FORMAL LOGIC; LOGIC PROGRAMMING;

EID: 0026900438     PISSN: 07342071     EISSN: 15577333     Source Type: Journal    
DOI: 10.1145/146937.146940     Document Type: Article
Times cited : (65)

References (46)
  • 8
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • (Oakland, Calif., April 1987). IEEE, New York
    • CLARK, D. D., AND WILSON, D. R. A comparison of commercial and military computer security policies. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, Calif., April 1987). IEEE, New York, 1987, 184-194.
    • (1987) In Proceedings of IEEE Symposium on Security and Privacy , pp. 184-194
    • CLARK, D.D.1    WILSON, D.R.2
  • 9
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • (May)
    • DENNING, D. E. A lattice model of secure information flow. Commun. ACM 19, 5 (May 1976), 236-243.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • DENNING, D.E.1
  • 12
    • 0020299523 scopus 로고
    • Security policies and security models
    • (Oakland, Calif., April 1982). IEEE, New York
    • GOGUEN, J. A., AND MESEGUER, J. Security policies and security models. In IEEE Symposium on Security and Privacy (Oakland, Calif., April 1982). IEEE, New York, 1982, 11-20.
    • (1982) In IEEE Symposium on Security and Privacy , pp. 11-20
    • GOGUEN, J.A.1    MESEGUER, J.2
  • 13
    • 0023348314 scopus 로고
    • The development and proof of a formal specification for a multilevel secure system
    • (May)
    • GLASGOW, J. I., AND MACEWEN, G. H. The development and proof of a formal specification for a multilevel secure system. ACM Trans. Comput. Syst. 5, 2 (May 1987), 151-184.
    • (1987) ACM Trans. Comput. Syst. , vol.5 , Issue.2 , pp. 151-184
    • GLASGOW, J.I.1    MACEWEN, G.H.2
  • 14
    • 0023826589 scopus 로고
    • Reasoning about knowledge in multilevel secure distributed systems
    • (Oakland, Calif., 1988). IEEE, New York
    • GLASGOW, J. I., AND MACEWEN, G. H. Reasoning about knowledge in multilevel secure distributed systems. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., 1988). IEEE, New York, 1988, 122-128.
    • (1988) In Proceedings of the IEEE Symposium on Security and Privacy , pp. 122-128
    • GLASGOW, J.I.1    MACEWEN, G.H.2
  • 18
    • 34249976000 scopus 로고
    • An operator net model for distributed systems
    • (Sept.)
    • GLASGOW, J. I., AND MACEWEN, G. H. An operator net model for distributed systems. J. Distributed Syst. 3, 4 (Sept. 1989), 196-209.
    • (1989) J. Distributed Syst. , vol.3 , Issue.4 , pp. 196-209
    • GLASGOW, J.I.1    MACEWEN, G.H.2
  • 20
    • 66149190137 scopus 로고
    • Reasoning about knowledge and permission in secure distributed systems
    • (Franconia, N.H.,), IEEE, New York, 1988, 139-146. Also appears in IEEE Cipher
    • GLASGOW, J. I., MACEWEN, G. H., AND PANANGADEN, P. Reasoning about knowledge and permission in secure distributed systems. In Proceedings of the Computer Security Foundations Workshop (Franconia, N.H., 1988). IEEE, New York, 1988, 139-146. Also appears in IEEE Cipher.
    • (1988) In Proceedings of the Computer Security Foundations Workshop
    • GLASGOW, J.I.1    MACEWEN, G.H.2    PANANGADEN, P.3
  • 26
    • 0024063861 scopus 로고
    • Stating security requirements with tolerable sets
    • (Aug.)
    • JOHNSON, D. M., AND THAYER, F. J. Stating security requirements with tolerable sets. ACM Trans. Comput. Syst. 6, 3 (Aug. 1988), 284-295.
    • (1988) ACM Trans. Comput. Syst. , vol.6 , Issue.3 , pp. 284-295
    • JOHNSON, D.M.1    THAYER, F.J.2
  • 28
    • 0001972488 scopus 로고
    • Semantical considerations of modal logic
    • KRIPKE, S. Semantical considerations of modal logic. Acta Philosophica Fennica 16 (1963), 83-94.
    • (1963) Acta Philosophica Fennica , vol.16 , pp. 83-94
    • KRIPKE, S.1
  • 30
    • 0019608720 scopus 로고
    • Formal models for computer security
    • (Sept.)
    • LANDWEHR, C. E. Formal models for computer security. ACM Comput. Surv. 13, 3 (Sept. 1981), 247-278.
    • (1981) ACM Comput. Surv. , vol.13 , Issue.3 , pp. 247-278
    • LANDWEHR, C.E.1
  • 31
    • 84976652798 scopus 로고
    • Tech. Rep., SRI International, Computer Science Lab., Menlo Park, Calif, Feb.
    • LUNT, T. F. ET AL. The Seaview formal security policy model. Tech. Rep., SRI International, Computer Science Lab., Menlo Park, Calif, Feb. 1989.
    • (1989) The Seaview formal security policy model
    • LUNT, T.F.1
  • 33
    • 0023231848 scopus 로고
    • Specifications for multi-level security and a hook-up property
    • (Oakland, Calif., April 1987), IEEE, New York
    • MCCULLOUGH, A. D. Specifications for multi-level security and a hook-up property. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, Calif., April 1987), IEEE, New York, 1987, 161-166.
    • (1987) In Proceedings of IEEE Symposium on Security and Privacy , pp. 161-166
    • MCCULLOUGH, A.D.1
  • 35
    • 0023829319 scopus 로고
    • Non-interference and the composability of security properties
    • (Oakland, Calif., April 1988), IEEE, New York
    • MCCULLOUGH, A. D. Non-interference and the composability of security properties. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, Calif., April 1988), IEEE, New York, 1988, 177-186.
    • (1988) In Proceedings of IEEE Symposium on Security and Privacy , pp. 177-186
    • MCCULLOUGH, A.D.1
  • 36
    • 0023218630 scopus 로고
    • Reasoning about security models
    • (Oakland, Calif., April 1987), IEEE, New York
    • MCLEAN, J. Reasoning about security models. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, Calif., April 1987), IEEE, New York, 1987, 123-131.
    • (1987) In Proceedings of IEEE Symposium on Security and Privacy , pp. 123-131
    • MCLEAN, J.1
  • 38
    • 0024928980 scopus 로고
    • A logic of knowledge and belief for reasoning about computer security
    • (Franconia, N.H.,)
    • MOSER, L. A logic of knowledge and belief for reasoning about computer security. In Proceedings of the Computer Security Foundations Workshop II (Franconia, N.H., 1989), 57-63.
    • (1989) In Proceedings of the Computer Security Foundations Workshop II , pp. 57-63
    • MOSER, L.1
  • 42
    • 49149133038 scopus 로고
    • The temporal logic of concurrent programs
    • PNUELI, A. The temporal logic of concurrent programs. Theor. Comput. Sci. 13 (1981), 45-60.
    • (1981) Theor. Comput. Sci. , vol.13 , pp. 45-60
    • PNUELI, A.1
  • 45
    • 85041481084 scopus 로고
    • Design and verification of secure systems
    • (Dec.)
    • RUSHBY, J. M. Design and verification of secure systems. ACM SIGOPS 15, 5 (Dec. 1981), 12-21.
    • (1981) ACM SIGOPS , vol.15 , Issue.5 , pp. 12-21
    • RUSHBY, J.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.