메뉴 건너뛰기




Volumn 21, Issue 2, 2003, Pages 87-106

Secure software infrastructure in the internet age

Author keywords

Internet security; Language based security; Runtime monitoring; Software security; Verification and static analysis

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; COMPUTER SOFTWARE; INTERNET; SYSTEMS ANALYSIS;

EID: 0037238712     PISSN: 02883635     EISSN: None     Source Type: Journal    
DOI: 10.1007/BF03037627     Document Type: Article
Times cited : (1)

References (46)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Abadi, M., Gordon, A. D., "A Calculus for Cryptographic Protocols: The Spi Calculus," Information and Computation, 148, 1, pp. 1-70, 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 2
    • 0025230154 scopus 로고
    • Secure circuit evaluation: A protocol based on hiding information from an oracle
    • Abadi, M., Feigenbaum, J., "Secure Circuit Evaluation: A Protocol Based on Hiding Information from an Oracle," J. of Cryptology, 2, 1, pp. 1-12, 1990.
    • (1990) J. of Cryptology , vol.2 , Issue.1 , pp. 1-12
    • Abadi, M.1    Feigenbaum, J.2
  • 3
    • 85038458744 scopus 로고    scopus 로고
    • Formalization and verification of a mail server in coq
    • to appear
    • Affeldt, R. and Kobayashi, N., "Formalization and Verification of a Mail Server in Coq," in Proc. of ISSS2002, LNCS, to appear, 2003.
    • (2003) Proc. of ISSS2002, LNCS
    • Affeldt, R.1    Kobayashi, N.2
  • 4
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Aleph One
    • Aleph One, "Smashing the Stack for Fun and Profit," Phrack 49, 7, 1996, http://www.phrack.org/leecharch.php?p=49
    • (1996) Phrack , vol.49 , Issue.7
  • 5
    • 84955621400 scopus 로고    scopus 로고
    • Tamper resistant software: An implementation
    • Aucsmith, D., "Tamper Resistant Software: An Implementation," Information Hiding, LNCS 1174, pp. 317-333, 1996.
    • (1996) Information Hiding, LNCS 1174 , pp. 317-333
    • Aucsmith, D.1
  • 10
    • 84967701397 scopus 로고
    • The design philosophy of the DARPA internet protocols
    • Clark, D. D., "The Design Philosophy of the DARPA Internet Protocols," in Proc. of SIGCOMM'88, Computer Communication Review, 18, 4, pp. 106-114, 1988.
    • (1988) Proc. of SIGCOMM'88, Computer Communication Review , vol.18 , Issue.4 , pp. 106-114
    • Clark, D.D.1
  • 12
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning, D. E., "A Lattice Model of Secure Information Flow," Comm. of the ACM, 19, 5, pp. 236-243, 1976.
    • (1976) Comm. of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 13
    • 0007928023 scopus 로고    scopus 로고
    • FDR2 user manual
    • Formal Systems (Europe) Ltd.
    • Formal Systems (Europe) Ltd., "FDR2 User Manual," http://www.formal.demon.co.uk/fdr2manual/index.html, 2000.
    • (2000)
  • 14
    • 4444381692 scopus 로고    scopus 로고
    • An empirical study of the robustness of windows NT applications using random testing
    • Forrester, J. E. and Miller, B. P., "An Empirical Study of the Robustness of Windows NT Applications Using Random Testing," USENIX Windows Systems Symp., 2000.
    • USENIX Windows Systems Symp., 2000
    • Forrester, J.E.1    Miller, B.P.2
  • 17
    • 85084163781 scopus 로고    scopus 로고
    • Lessons learned in implementing and deploying crypto software
    • Gutmann, P., "Lessons Learned in Implementing and Deploying Crypto Software," in Proc. of 11th USENIX Security Symp., pp. 315-326, 2002.
    • (2002) Proc. of 11th USENIX Security Symp. , pp. 315-326
    • Gutmann, P.1
  • 22
    • 78650021071 scopus 로고    scopus 로고
    • Software pot: An encapsulated transferable file system for secure software circulation
    • to appear
    • Kato, K. and Oyama, Y., "Software Pot: An Encapsulated Transferable File System for Secure Software Circulation," in Proc. of ISSS2002, LNCS, to appear, 2003.
    • (2003) Proc. of ISSS2002, LNCS
    • Kato, K.1    Oyama, Y.2
  • 23
  • 26
    • 0025557712 scopus 로고
    • An empirical study of the reliability of UNIX utilities
    • Miller, B. P., Fredriksen, L. and So, B., "An Empirical Study of the Reliability of UNIX Utilities," Comm. of the ACM, 33, 12, pp. 32-44, 1990.
    • (1990) Comm. of the ACM , vol.33 , Issue.12 , pp. 32-44
    • Miller, B.P.1    Fredriksen, L.2    So, B.3
  • 29
    • 0003508570 scopus 로고    scopus 로고
    • Data encryption standard (DES)
    • National Institute of Standards and Technology; FIPS PUB 46-3
    • National Institute of Standards and Technology, "Data Encryption Standard (DES)," FIPS PUB 46-3, 1999.
    • (1999)
  • 33
    • 85038453214 scopus 로고    scopus 로고
    • Fail-safe ANSI-C compiler: An approach to making C programs secure
    • to appear
    • Oiwa, Y., Sekiguchi, T., Sumii, E., Yonezawa, A., "Fail-safe ANSI-C Compiler: An Approach to Making C Programs Secure," in Proc. of ISSS2002, LNCS, to appear, 2003.
    • (2003) Proc. of ISSS2002, LNCS
    • Oiwa, Y.1    Sekiguchi, T.2    Sumii, E.3    Yonezawa, A.4
  • 35
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R. L., Shamir, A., and Adelman, L. M., "A Method for Obtaining Digital Signatures and Public-key Cryptosystems," Comm. of the ACM, 21, 2, pp. 120-126, 1978.
    • (1978) Comm. of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adelman, L.M.3
  • 36
    • 0024684041 scopus 로고
    • With microscope and tweezers: The worm from MIT's perspective
    • Rochlis, J. A. and Eichin, M. W., "With Microscope and Tweezers: the Worm from MIT's Perspective," Comm. of the ACM, 32, 6, 689-698, 1989.
    • (1989) Comm. of the ACM , vol.32 , Issue.6 , pp. 689-698
    • Rochlis, J.A.1    Eichin, M.W.2
  • 46
    • 0034952594 scopus 로고    scopus 로고
    • Web security: Authentication protocols and their analysis
    • Wen, W. and Mizoguchi, F., "Web Security: Authentication Protocols and Their Analysis," New Generation Computing, 19, 3, pp. 283-299, 2001.
    • (2001) New Generation Computing , vol.19 , Issue.3 , pp. 283-299
    • Wen, W.1    Mizoguchi, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.