메뉴 건너뛰기




Volumn , Issue , 1998, Pages 34-43

Probabilistic noninterference in a concurrent language

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COMPUTATIONAL LINGUISTICS; COMPUTER SOFTWARE; CONCURRENCY CONTROL; CRYPTOGRAPHY; FORMAL LANGUAGES; PROBABILITY;

EID: 0031633213     PISSN: 10636900     EISSN: None     Source Type: None    
DOI: 10.1109/CSFW.1998.683153     Document Type: Conference Paper
Times cited : (53)

References (18)
  • 2
    • 48649094072 scopus 로고
    • Information flow control in a parallel language framework
    • J. Banâtre C. Bryce Information flow control in a parallel language framework Proceedings 6th IEEE Computer Security Foundations Workshop 39 52 Proceedings 6th IEEE Computer Security Foundations Workshop 1993-June
    • (1993) , pp. 39-52
    • Banâtre, J.1    Bryce, C.2
  • 3
    • 0003421261 scopus 로고
    • An Introduction to Probability Theory and Its Applications
    • third John Wiley & Sons, Inc.
    • W. Feller An Introduction to Probability Theory and Its Applications third I 1968 John Wiley & Sons, Inc.
    • (1968) , vol.I
    • Feller, W.1
  • 4
    • 84974776068 scopus 로고    scopus 로고
    • A classification of security properties for process algebras
    • R. Focardi R. Gorrieri A classification of security properties for process algebras Journal of Computer Security 3 1 5 33 1994/1995
    • Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 5
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • R. Focardi R. Gorrieri The compositional security checker: A tool for the verification of information flow security properties IEEE Transactions on Software Engineering 23 9 550 571 1997
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 6
    • 0025019906 scopus 로고
    • Probabilistic interference
    • CA
    • J. W. Gray Probabilistic interference Proceedings 1990 IEEE Symposium on Security and Privacy 170 179 Proceedings 1990 IEEE Symposium on Security and Privacy Oakland CA 1990-May
    • (1990) , pp. 170-179
    • Gray, J.W.1
  • 7
    • 0026157130 scopus 로고
    • Toward a mathematical foundation for information flow security
    • CA
    • J. W. Gray Toward a mathematical foundation for information flow security Proceedings 1991 IEEE Symposium on Security and Privacy 21 34 Proceedings 1991 IEEE Symposium on Security and Privacy Oakland CA 1991-May
    • (1991) , pp. 21-34
    • Gray, J.W.1
  • 8
    • 0031701347 scopus 로고    scopus 로고
    • The SLam Calculus: Programming with secrecy and integrity
    • CA
    • N. Heintze J. Riecke The SLam Calculus: Programming with secrecy and integrity Proceedings 25th Symposium on Principles of Programming Languages 365 377 Proceedings 25th Symposium on Principles of Programming Languages San Diego CA 1998-Jan.
    • (1998) , pp. 365-377
    • Heintze, N.1    Riecke, J.2
  • 9
    • 0141890488 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems
    • P. Kocher Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems Proceedings 16th Annual Crypto Conference Proceedings 16th Annual Crypto Conference 1996-Aug.
    • (1996)
    • Kocher, P.1
  • 11
    • 0025139568 scopus 로고
    • Security models and information flow
    • CA
    • J. McLean Security models and information flow Proceedings 1990 IEEE Symposium on Security and Privacy 180 187 Proceedings 1990 IEEE Symposium on Security and Privacy Oakland CA 1990
    • (1990) , pp. 180-187
    • McLean, J.1
  • 12
    • 0004195071 scopus 로고
    • Encyclopedia of Software Engineering
    • Security models Wiley Press
    • J. McLean Encyclopedia of Software Engineering 1994 Wiley Press Security models
    • (1994)
    • McLean, J.1
  • 13
    • 67650521015 scopus 로고
    • Protection against covert storage and timing channels
    • P. Melliar-Smith L. Moser Protection against covert storage and timing channels Proceedings 4th IEEE Computer Security Foundations Workshop 209 214 Proceedings 4th IEEE Computer Security Foundations Workshop 1991-June
    • (1991) , pp. 209-214
    • Melliar-Smith, P.1    Moser, L.2
  • 14
    • 0013162780 scopus 로고
    • Semantics with Applications, A Formal Introduction
    • Wiley
    • H. R. Nielson F. Nielson Semantics with Applications, A Formal Introduction 1992 Wiley
    • (1992)
    • Nielson, H.R.1    Nielson, F.2
  • 15
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • CA
    • G. Smith D. Volpano Secure information flow in a multi-threaded imperative language Proceedings 25th Symposium on Principles of Programming Languages 355 364 Proceedings 25th Symposium on Principles of Programming Languages San Diego CA 1998-Jan.
    • (1998) , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 16
    • 85058413942 scopus 로고    scopus 로고
    • Eliminating covert flows with minimum typings
    • D. Volpano G. Smith Eliminating covert flows with minimum typings Proceedings 10th IEEE Computer Security Foundations Workshop 156 168 Proceedings 10th IEEE Computer Security Foundations Workshop 1997-June
    • (1997) , pp. 156-168
    • Volpano, D.1    Smith, G.2
  • 18
    • 0025135716 scopus 로고
    • Information flow in nondeterministic systems
    • CA
    • J. T. Wittbold D. M. Johnson Information flow in nondeterministic systems Proceedings 1990 IEEE Symposium on Security and Privacy 144 161 Proceedings 1990 IEEE Symposium on Security and Privacy Oakland CA 1990-May
    • (1990) , pp. 144-161
    • Wittbold, J.T.1    Johnson, D.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.