메뉴 건너뛰기




Volumn 21, Issue 1, 2003, Pages 36-43

A nonfunctional approach to system integrity

Author keywords

Computer security; Cryptography; Data security; Fault tolerance; Modeling; Protection; Protocols; Reliability; Software verification and validation; System analysis and design

Indexed keywords

COMPUTER SOFTWARE SELECTION AND EVALUATION; CRYPTOGRAPHY; FAULT TOLERANT COMPUTER SYSTEMS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; RELIABILITY; SYSTEMS ANALYSIS;

EID: 0037247408     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2002.806124     Document Type: Article
Times cited : (23)

References (33)
  • 2
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • MITRE Corporation, Bedford, MA, MTR-3153 Rev. 1 (ESD-TR-76-372)
    • K. J. Biba, "Integrity considerations for secure computer systems," MITRE Corporation, Bedford, MA, MTR-3153 Rev. 1 (ESD-TR-76-372), 1976.
    • (1976)
    • Biba, K.J.1
  • 5
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev and A. C. Yao, "On the security of public key protocols," IEEE Trans. Inform. Theory, vol. IT-29, pp. 198-208, 1983.
    • (1983) IEEE Trans. Inform. Theory , vol.IT-29 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 6
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • R. Focardi and R. Gorrieri, "A classification of security properties for process algebras," J. Comput. Security, vol. 3, pp. 5-33, 1995.
    • (1995) J. Comput. Security , vol.3 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 8
    • 0030680628 scopus 로고    scopus 로고
    • The specification and implementation of commercial security requirements including dynamic segregation of duties
    • ____, "The specification and implementation of commercial security requirements including dynamic segregation of duties," in ACM Conf. Computer Communications Security, 1997, pp. 125-134.
    • ACM Conf. Computer Communications Security, 1997 , pp. 125-134
    • Foley, S.N.1
  • 13
    • 0012798495 scopus 로고
    • The varieties of refinement
    • J. M. Morris and R. C. Shaw, Eds.
    • ____, "The varieties of refinement," in Proc. 4th Refinement Workshop, J. M. Morris and R. C. Shaw, Eds., 1991, pp. 441-455.
    • (1991) Proc. 4th Refinement Workshop , pp. 441-455
    • Jacob, J.L.1
  • 14
    • 84974756266 scopus 로고
    • Basic theorems about security
    • ____, "Basic theorems about security," J. Comput. Security, vol. 1, no. 4, pp. 385-411, 1992.
    • (1992) J. Comput. Security , vol.1 , Issue.4 , pp. 385-411
    • Jacob, J.L.1
  • 15
    • 0030677524 scopus 로고    scopus 로고
    • A logical language for expressing authorizations
    • S. Jajodia et al., "A logical language for expressing authorizations," in Proc. Symp. Security Privacy, 1997, pp. 31-42.
    • Proc. Symp. Security Privacy, 1997 , pp. 31-42
    • Jajodia, S.1
  • 17
    • 0028058408 scopus 로고    scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • J. McLean, "A general theory of composition for trace sets closed under selective interleaving functions," in Proc. IEEE Symp. Research Security and Privacy, 1994, pp. 79-93.
    • Proc. IEEE Symp. Research Security and Privacy, 1994 , pp. 79-93
    • McLean, J.1
  • 18
    • 0012842372 scopus 로고
    • Later developments at Cambridge: Titan, CAP and the Cambridge ring
    • R. Needham, "Later developments at Cambridge: Titan, CAP and the Cambridge ring," Ann. History Comput., vol. 14, pp. 57-58, 1992.
    • (1992) Ann. History Comput. , vol.14 , pp. 57-58
    • Needham, R.1
  • 19
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson, "The inductive approach to verifying cryptographic protocols," J. Comput. Security, vol. 6, pp. 85-128, 1998.
    • (1998) J. Comput. Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 23
    • 0012886288 scopus 로고    scopus 로고
    • Mathematical models of computer security
    • New York: Springer-Verlag
    • P. Y. A. Ryan, "Mathematical models of computer security," in Foundations of Security Analysis and Design. New York: Springer-Verlag, 2000.
    • (2000) Foundations of Security Analysis and Design
    • Ryan, P.Y.A.1
  • 26
    • 0030086382 scopus 로고    scopus 로고
    • Role based access control models
    • ____, "Role based access control models," IEEE Computer, vol. pp. 38-47, 1996.
    • (1996) IEEE Computer , vol.29 , pp. 38-47
    • Sandhu, R.1
  • 30
    • 4244073835 scopus 로고    scopus 로고
    • Safety through security
    • Ph.D. dissertation, Oxford Univ., Comput. Lab.
    • A. C. Simpson, "Safety through security," Ph.D. dissertation, Oxford Univ., Comput. Lab., 1996.
    • (1996)
    • Simpson, A.C.1
  • 32
    • 0012795337 scopus 로고
    • Integrity-oriented control objectives: Proposed revisions to the trusted computer system evaluation criteria (TCSEC)
    • U. S. Dept. Defense, DOD 5200.28-STD
    • "Integrity-Oriented Control Objectives: Proposed Revisions to the Trusted Computer System Evaluation Criteria (TCSEC)," U. S. Dept. Defense, DOD 5200.28-STD, 1991.
    • (1991)
  • 33
    • 4243267407 scopus 로고
    • Specifications for fault-tolerance
    • Odyssey Research Associates, Ithaca, NY, 19-3
    • D. Weber, "Specifications for Fault-Tolerance," Odyssey Research Associates, Ithaca, NY, 19-3, 1988.
    • (1988)
    • Weber, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.