메뉴 건너뛰기




Volumn 54, Issue 2-3, 2003, Pages 137-150

A decidable notion of timed non-interference

Author keywords

[No Author keywords available]

Indexed keywords

FINITE AUTOMATA; LARGE SCALE SYSTEMS; NETWORK COMPONENTS; NETWORK PROTOCOLS; REAL TIME SYSTEMS; SECURITY OF DATA; TELECOMMUNICATION INDUSTRY;

EID: 0037834671     PISSN: 01692968     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (26)

References (20)
  • 1
    • 84887088164 scopus 로고    scopus 로고
    • The power of reachability testing for timed automata
    • Proceedings of Foundations Software Technology and Theoretical Computer Science, Springer
    • Aceto, L., Bouyer, P., Burgueño, A. and Guldstrand Larsen, K. (1998) The Power of Reachability Testing for Timed Automata. In Proceedings of Foundations Software Technology and Theoretical Computer Science, Springer LNCS 1530, 245-256.
    • (1998) LNCS , vol.1530 , pp. 245-256
    • Aceto, L.1    Bouyer, P.2    Burgueño, A.3    Guldstrand, L.K.4
  • 2
    • 84947923383 scopus 로고    scopus 로고
    • Model checking via reachability testing for timed automata
    • Proceedings of TACAS'98, Springer
    • Aceto, L., Burgueño, A. and Guldstrand Larsen, K. (1998) Model Checking via Reachability Testing for Timed Automata. In Proceedings of TACAS'98, Springer LNCS 1384, 263-280.
    • (1998) LNCS , vol.1384 , pp. 263-280
    • Aceto, L.1    Burgueño, A.2    Guldstrand, L.K.3
  • 5
    • 0028202370 scopus 로고
    • A really temporal logic
    • Alur, R. and Henzinger, T.A. (1994) A Really Temporal Logic. Journal of ACM, 41, 181-204.
    • (1994) Journal of ACM , vol.41 , pp. 181-204
    • Alur, R.1    Henzinger, T.A.2
  • 6
    • 84947906847 scopus 로고    scopus 로고
    • Networks of timed processes
    • Proceedings of TACAS'98, Springer
    • Abdulla, P.A. and Jonsson, B. (1998) Networks of timed processes. In Proceedings of TACAS'98, Springer LNCS 1384, 298-312.
    • (1998) LNCS , vol.1384 , pp. 298-312
    • Abdulla, P.A.1    Jonsson, B.2
  • 9
    • 84954462346 scopus 로고    scopus 로고
    • A practical implementation of the timing attack
    • Proceedings of CARDIS 1998, Springer
    • Dhem, J-F., Koeune, F., Leroux, P-A., Mestr, P., Quisquater, J-J. and Willems, J-L. (2000) A Practical Implementation of the Timing Attack. In Proceedings of CARDIS 1998, Springer LNCS 1820, 167-182.
    • (2000) LNCS , vol.1820 , pp. 167-182
    • Dhem, J.-F.1    Koeune, F.2    Leroux, P.-A.3    Mestr, P.4    Quisquater, J.-J.5    Willems, J.-L.6
  • 10
    • 84958771675 scopus 로고    scopus 로고
    • Automatic compositional verification of some security properties
    • Proceedings of TACAS'96, Springer
    • Focardi, R. and Gorrieri, R. (1996) Automatic Compositional Verification of Some Security Properties. In Proceedings of TACAS'96, Springer LNCS 1055, 167-186.
    • (1996) LNCS , vol.1055 , pp. 167-186
    • Focardi, R.1    Gorrieri, R.2
  • 11
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • Focardi, R. and Gorrieri, R. (1997) The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Transactions on Software Engineering, 23(9), 550-571.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 13
    • 0001558581 scopus 로고
    • Verification methods for the divergent runs of clock systems
    • Proceedings of Formal Techniques in Real-Time and Fault-Tolerant Systems, Springer
    • Henzinger, T.A. and Kopke, P.W. (1994) Verification Methods for the Divergent Runs of Clock Systems. In Proceedings of Formal Techniques in Real-Time and Fault-Tolerant Systems, Springer LNCS 863, 351-372.
    • (1994) LNCS , vol.863 , pp. 351-372
    • Henzinger, T.A.1    Kopke, P.W.2
  • 15
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, rsa, DSS, and other systems
    • Proceedings of CRYPTO 1996, Springer
    • Kocher, P.C. (1996) Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In proceedings of CRYPTO 1996, Springer LNCS 1109, 104-113.
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 16
    • 0023288130 scopus 로고
    • A fast mutual exclusion algorithm
    • Lamport, L. (1987) A Fast Mutual Exclusion Algorithm. ACM TOPLAS, 5, 1-11.
    • (1987) ACM TOPLAS , vol.5 , pp. 1-11
    • Lamport, L.1
  • 19
    • 68549092451 scopus 로고    scopus 로고
    • A timing attack against RSA with the Chinese remainder theorem
    • Proceedings of CHES 2000, Springer
    • Schindler, W. (2000) A Timing Attack against RSA with the Chinese Remainder Theorem. In Proceedings of CHES 2000, Springer LNCS 1965, 109-124.
    • (2000) LNCS , vol.1965 , pp. 109-124
    • Schindler, W.1
  • 20
    • 84958967825 scopus 로고    scopus 로고
    • Model checking timed automata
    • Lectures on Embedded Systems, Springer
    • Yovine, S. (1996) Model Checking Timed Automata. Lectures on Embedded Systems, Springer LNCS 1494, 114-152.
    • (1996) LNCS , vol.1494 , pp. 114-152
    • Yovine, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.