메뉴 건너뛰기




Volumn 35, Issue 5, 2001, Pages 1-14

Untrusted hosts and confidentiality: Secure program partitioning

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; ELECTRONIC MAIL;

EID: 0036036793     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/502059.502036     Document Type: Article
Times cited : (57)

References (51)
  • 3
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and Multics interpretation
    • MITRE Corp. MTR-2997, Bedford, MA, Available as NTIS AD-A023 588
    • D. E. Bell and L. J. LaPadula. Secure computer system: Unified exposition and Multics interpretation. Technical Report ESD-TR-75-306, MITRE Corp. MTR-2997, Bedford, MA, 1975. Available as NTIS AD-A023 588.
    • (1975) Technical Report ESD-TR-75-306
    • Bell, D.E.1    LaPadula, L.J.2
  • 4
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • USAF Electronic Systems Division, Bedford, MA, April
    • K. J. Biba. Integrity considerations for secure computer systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, April 1977.
    • (1977) Technical Report ESD-TR-76-372
    • Biba, K.J.1
  • 5
    • 0040283808 scopus 로고    scopus 로고
    • Cryptix
    • Cryptix. http://uww.cryptix.org/products/cryptix31/.
  • 6
    • 84957697395 scopus 로고
    • On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
    • Jacques Stern, editor, LNCS Springer
    • Ivan Damgård, Joe Kilian, and Louis Salvail. On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In Jacques Stern, editor, Advances in Cryptology - Proceedings of EUROCRYPT 99, LNCS 1592, pages 56-73. Springer, 1999.
    • (1592) Advances in Cryptology - Proceedings of EUROCRYPT 99 , pp. 56-73
    • Damgård, I.1    Kilian, J.2    Salvail, L.3
  • 7
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Dorothy E. Denning. A lattice model of secure information flow. Comm. of the ACM, 19(5):236-243, 1976.
    • (1976) Comm. of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 8
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • Dorothy E. Denning and Peter J. Denning. Certification of Programs for Secure Information Flow. Comm. of the ACM, 20(7):504-513, July 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 11
    • 0020878801 scopus 로고
    • A randomized protocol for signing contracts
    • R.L. Rivest, A. Sherman, and D. Chaum, editors, Plenum Press
    • S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. In R.L. Rivest, A. Sherman, and D. Chaum, editors, Advances in Cryptology: Proc. of CRYPTO 82, pages 205-210. Plenum Press, 1983.
    • (1983) Advances in Cryptology: Proc. of CRYPTO 82 , pp. 205-210
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 12
    • 0003562729 scopus 로고
    • A technique for proving specifications are multilevel secure
    • SRI International Computer Science Lab, Menlo Park, California, January
    • Richard J. Feiertag. A technique for proving specifications are multilevel secure. Technical Report CSL-109, SRI International Computer Science Lab, Menlo Park, California, January 1980.
    • (1980) Technical Report CSL-109
    • Feiertag, R.J.1
  • 13
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • May
    • J. S. Fenton. Memoryless subsystems. Computing J., 17(2):143-147, May 1974.
    • (1974) Computing J. , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 18
    • 0040283805 scopus 로고    scopus 로고
    • Java secure socket extension (JSSE). http://java.sun.com/products/jsse/.
  • 19
    • 0023960862 scopus 로고
    • Fine-grained mobility in the Emerald system
    • February
    • E. Jul et al. Fine-grained mobility in the Emerald system. ACM Transactions on Computer Systems, 6(1):109-133, February 1988.
    • (1988) ACM Transactions on Computer Systems , vol.6 , Issue.1 , pp. 109-133
    • Jul, E.1
  • 22
    • 0034823079 scopus 로고    scopus 로고
    • A generic approach to the security of multi-threaded programs
    • IEEE Computer Society Press, June
    • Heiko Mantel and Andrei Sabelfeld. A generic approach to the security of multi-threaded programs. In Proc. of the 14th IEEE Computer Security Foundations Workshop, pages 200-214. IEEE Computer Society Press, June 2001.
    • (2001) Proc. of the 14th IEEE Computer Security Foundations Workshop , pp. 200-214
    • Mantel, H.1    Sabelfeld, A.2
  • 23
    • 0026910016 scopus 로고
    • Multilevel security in the UNIX tradition
    • August
    • M. D. McIlroy and J. A. Reeds. Multilevel security in the UNIX tradition. Software - Practice and Experience, 22(8):673-694, August 1992.
    • (1992) Software - Practice and Experience , vol.22 , Issue.8 , pp. 673-694
    • McIlroy, M.D.1    Reeds, J.A.2
  • 24
    • 0016951438 scopus 로고
    • Security kernel validation in practice
    • May
    • Jonathan K. Millen. Security kernel validation in practice. Comm. of the ACM, 19(5):243-250, May 1976.
    • (1976) Comm. of the ACM , vol.19 , Issue.5 , pp. 243-250
    • Millen, J.K.1
  • 25
  • 32
    • 0039099864 scopus 로고    scopus 로고
    • Platform for privacy preferences (P3P)
    • Platform for privacy preferences (P3P). http://www.w3.org/p3p.
  • 33
    • 84955596529 scopus 로고
    • Trust in the λ-calculus
    • number 983 in Lecture Notes in Computer Science, Springer, September
    • Jens Palsberg and Peter Ørbaek. Trust in the λ-calculus. In Proc. 2nd International Symposium on Static Analysis, number 983 in Lecture Notes in Computer Science, pages 314-329. Springer, September 1995.
    • (1995) Proc. 2nd International Symposium on Static Analysis , pp. 314-329
    • Palsberg, J.1    ØRbaek, P.2
  • 36
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Harvard Aiken Computation Laboratory
    • M. Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory, 1981.
    • (1981) Technical Report TR-81
    • Rabin, M.1
  • 37
    • 0040283806 scopus 로고    scopus 로고
    • Java remote method interface (RMI). http://java.sun.com/products/jdk/rmi/.
  • 39
    • 0033700286 scopus 로고    scopus 로고
    • Probabilistic noninterference for multi-threaded programs
    • IEEE Computer Society Press, July
    • Andrei Sabelfeld and David Sands. Probabilistic noninterference for multi-threaded programs. In Proc. of the 13th IEEE Computer Security Foundations Workshop, pages 200-214. IEEE Computer Society Press, July 2000.
    • (2000) Proc. of the 13th IEEE Computer Security Foundations Workshop , pp. 200-214
    • Sabelfeld, A.1    Sands, D.2
  • 40
    • 0001778364 scopus 로고    scopus 로고
    • Enforceable security policies
    • Also available as TR 99-1759, Computer Science Department, Cornell University, Ithaca, New York
    • Fred B. Schneider. Enforceable security policies. ACM Transactions on Information and System Security, 2001. Also available as TR 99-1759, Computer Science Department, Cornell University, Ithaca, New York.
    • (2001) ACM Transactions on Information and System Security
    • Schneider, F.B.1
  • 41
    • 0034835461 scopus 로고    scopus 로고
    • A new type system for secure information flow
    • IEEE Computer Society Press, jun
    • Geoffrey Smith. A new type system for secure information flow. In CSFW14, pages 115-125. IEEE Computer Society Press, jun 2001.
    • (2001) CSFW14 , pp. 115-125
    • Smith, G.1
  • 42
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • San Diego, California, January
    • Geoffrey Smith and Dennis Volpano. Secure information flow in a multi-threaded imperative language. In Proc. 25th ACM Symp. on Principles of Programming Languages (POPL), pages 355-364, San Diego, California, January 1998.
    • (1998) Proc. 25th ACM Symp. on Principles of Programming Languages (POPL) , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 44
    • 0000990322 scopus 로고
    • A survey of program slicing techniques
    • Frank Tip. A survey of program slicing techniques. Journal of Programming Languages, 3:121-189, 1995.
    • (1995) Journal of Programming Languages , vol.3 , pp. 121-189
    • Frank, T.1
  • 46
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Dennis Volpano, Geoffrey Smith, and Cynthia Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 48
    • 85084164692 scopus 로고    scopus 로고
    • SSH - Secure login connections over the Internet
    • San Jose, California
    • Tatu Ylonen. SSH - secure login connections over the Internet. In The Sixth USENIX Security Symposium Proceedings, pages 37-42, San Jose, California, 1996.
    • (1996) The Sixth USENIX Security Symposium Proceedings , pp. 37-42
    • Ylonen, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.