메뉴 건너뛰기




Volumn 21, Issue 1, 2003, Pages 20-35

Real-time information flow analysis

Author keywords

Bisimulation; Information flow security; Partial mode checking; Process algebra; Real time systems; Timing covert channels

Indexed keywords

BOOLEAN ALGEBRA; COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTER SIMULATION; MATHEMATICAL MODELS; REAL TIME SYSTEMS; RESPONSE TIME (COMPUTER SYSTEMS); SECURITY OF DATA; SYNCHRONIZATION;

EID: 0037246625     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2002.806122     Document Type: Article
Times cited : (47)

References (37)
  • 1
    • 84944050367 scopus 로고    scopus 로고
    • Probabilistic information flow in a process algebra
    • A. Aldini, "Probabilistic information flow in a process algebra," in Proc. CONCUR'01, vol. LNCS 2154, 2001, pp. 152-168.
    • (2001) Proc. CONCUR'01 , vol.LNCS2154 , pp. 152-168
    • Aldini, A.1
  • 2
    • 0028413052 scopus 로고
    • A theory of timed automata
    • R. Alur and D. L. Dill, "A theory of timed automata," Theor. Comput. Sci., vol. 126, 183-235, 1994.
    • (1994) Theor. Comput. Sci. , vol.126 , pp. 183-235
    • Alur, R.1    Dill, D.L.2
  • 3
    • 0029193016 scopus 로고    scopus 로고
    • Partial model checking (extended abstract)
    • H. R. Andersen, "Partial model checking (extended abstract)," in Proc. of LICS'95, 1995, pp. 398-407.
    • Proc. of LICS'95, 1995 , pp. 398-407
    • Andersen, H.R.1
  • 4
    • 0012876121 scopus 로고    scopus 로고
    • The Concurrency Workbench-NC. [Online]
    • The Concurrency Workbench-NC. [Online]. Available: http://www.cs.sunysb.edu/~cwb/
  • 8
    • 84974776068 scopus 로고
    • A classification of security properties
    • R. Focardi and R. Gorrieri, "A classification of security properties," J. Comput. Security, vol. 3, pp. 5-33, 1995.
    • (1995) J. Comput. Security , vol.3 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 9
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • ____, "The compositional security checker: A tool for the verification of information flow security properties," IEEE Trans. Softw. Eng., vol. 27, pp. 550-571, 1997.
    • (1997) IEEE Trans. Softw. Eng. , vol.27 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 10
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties. Part I: Information flow
    • New York: Springer-Verlag
    • ____, "Classification of security properties. Part I: Information flow," in Foundations of Security Analysis and Design. New York: Springer-Verlag, 2001. vol. LNCS 2171, pp. 331-396.
    • (2001) Foundations of Security Analysis and Design , vol.LNCS2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 14
    • 84958046259 scopus 로고    scopus 로고
    • A uniform approach for the definition of security properties
    • R. Focardi and F. Martinelli, "A uniform approach for the definition of security properties," in Proc. World Congress Formal Methods (FM'99), vol. LNCS 1708, 1999, pp. 794-813.
    • (1999) Proc. World Congress Formal Methods (FM'99) , vol.LNCS1708 , pp. 794-813
    • Focardi, R.1    Martinelli, F.2
  • 15
    • 0012268580 scopus 로고    scopus 로고
    • The linear time-Branching time spectrum
    • New York: Elsevier; ch. 1
    • R. J. van Glabbeek, "The linear time-Branching time spectrum," in Handbook of Process Algebra. New York: Elsevier, 2001, ch. 1.
    • (2001) Handbook of Process Algebra
    • Van Glabbeek, R.J.1
  • 18
    • 0027666919 scopus 로고
    • Transition system specifications with negative premises
    • J. F. Groote, "Transition system specifications with negative premises," Theor. Comput. Sci., vol. 118, pp. 263-299, 1993.
    • (1993) Theor. Comput. Sci. , vol.118 , pp. 263-299
    • Groote, J.F.1
  • 19
    • 4944243609 scopus 로고
    • A temporal process algebra
    • M. Hennessy and T. Regan, "A temporal process algebra," Inform. Comput., vol. 117, pp. 221-239, 1995.
    • (1995) Inform. Comput. , vol.117 , pp. 221-239
    • Hennessy, M.1    Regan, T.2
  • 21
    • 0012844098 scopus 로고    scopus 로고
    • Mudiv: A program performing partial model checking
    • M.S. thesis, Dept. Inform. Technol., Technical Univ. Denmark, Denmark
    • J. Lind-Nielsen, "Mudiv: A Program Performing Partial Model Checking," M.S. thesis, Dept. Inform. Technol., Technical Univ. Denmark, Denmark, 1996.
    • (1996)
    • Lind-Nielsen, J.1
  • 23
    • 0003490896 scopus 로고    scopus 로고
    • Formal methods for the analysis of open systems with applications to security properties
    • Ph.D. dissertation, University of Siena, Italy
    • F. Martinelli, "Formal Methods for the Analysis of Open Systems With Applications to Security Properties," Ph.D. dissertation, University of Siena, Italy, 1998.
    • (1998)
    • Martinelli, F.1
  • 24
    • 0031645024 scopus 로고    scopus 로고
    • Partial model checking and theorem proving for ensuring security properties
    • ____, "Partial model checking and theorem proving for ensuring security properties," in Proc. CSFW'98, 1998, pp. 44-52.
    • Proc. CSFW'98, 1998 , pp. 44-52
    • Martinelli, F.1
  • 27
    • 0003037229 scopus 로고
    • Operational and algebraic semantics of concurrent processes
    • J. van Leewen, Ed. Cambridge, MA: MIT Press; Formal Models and Semantics, ch. 19
    • R. Milner, "Operational and algebraic semantics of concurrent processes," in Handbook of Theoretical Computer Science, J. van Leewen, Ed. Cambridge, MA: MIT Press, 1990, vol. B, Formal Models and Semantics, ch. 19, pp. 1201-1242.
    • (1990) Handbook of Theoretical Computer Science , vol.B , pp. 1201-1242
    • Milner, R.1
  • 29
    • 84958780425 scopus 로고
    • An overview and synthesis on timed process algebras
    • J. W. de Bakker, C. Huizing, W. P. de Roever, G. Rozenberg, and editors, Eds.
    • X. Nicollin and J. Sifakis, "An overview and synthesis on timed process algebras," in Proc. Real-Time: Theory in Practice, vol. 600, Lecture Notes in Computer Science, J. W. de Bakker, C. Huizing, W. P. de Roever, G. Rozenberg, and editors, Eds., 1992, pp. 526-548.
    • (1992) Proc. Real-Time: Theory in Practice, Vol. 600, Lecture Notes in Computer Science , pp. 526-548
    • Nicollin, X.1    Sifakis, J.2
  • 30
    • 84949243805 scopus 로고    scopus 로고
    • Mathematical models of computer security
    • New York: Springer-Verlag
    • P. Y. A. Ryan, "Mathematical models of computer security," in Foundations of Security Analysis and Design. New York: Springer-Verlag, 2001, pp. 1-62.
    • (2001) Foundations of Security Analysis and Design , pp. 1-62
    • Ryan, P.Y.A.1
  • 32
    • 84944070422 scopus 로고    scopus 로고
    • Analysing time-dependent security properties in CSP using PVS
    • ____, "Analysing time-dependent security properties in CSP using PVS," in Procs. ESORICS, vol. LNCS 1895, 2000, pp. 222-237.
    • (2000) Procs. ESORICS , vol.LNCS1895 , pp. 222-237
    • Schneider, S.1
  • 33
    • 0001422438 scopus 로고
    • Characteristic formulae for processes with divergence
    • B. Steffen and A. Ingólfsdóttir, "Characteristic formulae for processes with divergence," Inform. Comput., vol. 110, no. 1, pp. 149-163, 1994.
    • (1994) Inform. Comput. , vol.110 , Issue.1 , pp. 149-163
    • Steffen, B.1    Ingólfsdóttir, A.2
  • 36
    • 0024681890 scopus 로고
    • An automata theoretic procedure for the propositional μ-calculus
    • ____, "An automata theoretic procedure for the propositional μ-Calculus," Inform. Comput., vol. 81, pp. 249-264, 1989.
    • (1989) Inform. Comput. , vol.81 , pp. 249-264
    • Street, R.S.1    Emerson, E.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.