메뉴 건너뛰기




Volumn 24, Issue 5, 2002, Pages 566-591

Information flow vs. resource access in the aqsynchronous pi-calculus

Author keywords

General security and protection (e.g., firewalls); Local and Wide Area Networks internet (e.g., CSMA CS); Network Architecture and Design distributed networks; Security and Protection information flow controls

Indexed keywords


EID: 0038893943     PISSN: 01640925     EISSN: None     Source Type: Journal    
DOI: 10.1145/570886.570890     Document Type: Article
Times cited : (61)

References (31)
  • 1
    • 84957668700 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Proceedings of TACS'97. Springer Verlag, New York
    • ABADI, M. 1997. Secrecy by typing in security protocols. In Proceedings of TACS'97. Lecture Notes in Computer Science, vol. 1281. Springer Verlag, New York, pp. 611-637.
    • (1997) Lecture Notes in Computer Science , vol.1281 , pp. 611-637
    • Abadi, M.1
  • 2
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and multics interpretation
    • MITRE Corporation
    • BELL, D. E. AND LAPADULA, L. J. 1995. Secure computer system: Unified exposition and multics interpretation. Tech. rep. MTR-2997. MITRE Corporation.
    • (1995) Tech. Rep. MTR-2997
    • Bell, D.E.1    Lapadula, L.J.2
  • 3
    • 84945976575 scopus 로고    scopus 로고
    • Control flow analysis for the π-calculus
    • Proceedings of CONCUR'98. Springer-Verlag, New York
    • BODEI, C., DEGANO, P., NIELSON, F., AND NIELSON, H. R. 1998. Control flow analysis for the π-calculus. In Proceedings of CONCUR'98. Lecture Notes in Computer Science, vol. 1466. Springer-Verlag, New York, pp. 84-98.
    • (1998) Lecture Notes in Computer Science , vol.1466 , pp. 84-98
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Nielson, H.R.4
  • 4
    • 84937705299 scopus 로고    scopus 로고
    • Static analysis of processes for no read-up and no write-down
    • Proceedings of the Foundations of Software Science and Computation Structures (FOSSACS'99). Springer-Verlag, New York
    • BODEI, C., DEGANO, P., NIELSON, F., AND NIELSON, H. R. 1999. Static analysis of processes for no read-up and no write-down. In Proceedings of the Foundations of Software Science and Computation Structures (FOSSACS'99). Lecture Notes in Computer Science, vol. 1578. Springer-Verlag, New York, pp. 120-134.
    • (1999) Lecture Notes in Computer Science , vol.1578 , pp. 120-134
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Nielson, H.R.4
  • 5
    • 0003403203 scopus 로고
    • Asynchrony and the π-calculus
    • INRIA-Sophia Antipolis
    • BOUDOL, G. 1992. Asynchrony and the π-calculus. Tech. Rep. 1702. INRIA-Sophia Antipolis.
    • (1992) Tech. Rep. 1702
    • Boudol, G.1
  • 6
    • 84879520825 scopus 로고    scopus 로고
    • Noninterference for concurrent programs
    • Proceedings of ICALP'01. Springer-Verlag, New York
    • BOUDOL, G. AND CASTELLANI, I. 2001. Noninterference for concurrent programs. In Proceedings of ICALP'01. Lecture Notes in Computer Science, vol. 2076. Springer-Verlag, New York, pp. 382-395.
    • (2001) Lecture Notes in Computer Science , vol.2076 , pp. 382-395
    • Boudol, G.1    Castellani, I.2
  • 7
    • 84887084615 scopus 로고    scopus 로고
    • Testing theories for asynchronous languages
    • Proceedings of the 18th Conference on Foundations of Software Technology and Theoretical Computer Science (Chennai, India, Dec. 17-19). Springer-Verlag, New York
    • CASTELLANI, I. AND HENNESSY, M. 1998. Testing theories for asynchronous languages. In Proceedings of the 18th Conference on Foundations of Software Technology and Theoretical Computer Science (Chennai, India, Dec. 17-19). Lecture Notes in Computer Science, vol. 1530. Springer-Verlag, New York.
    • (1998) Lecture Notes in Computer Science , vol.1530
    • Castellani, I.1    Hennessy, M.2
  • 9
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • DENNING, D. 1977. Certification of programs for secure information flow. Commun. ACM 20, 504-513.
    • (1977) Commun. ACM , vol.20 , pp. 504-513
    • Denning, D.1
  • 11
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • FOCARDI, R. AND GORRIERI, R. 1995. A classification of security properties for process algebras. J. Comput. Sec. 3, 1.
    • (1995) J. Comput. Sec. , vol.3 , pp. 1
    • Focardi, R.1    Gorrieri, R.2
  • 12
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • FOCARDI, R. AND GORRIERI, R. 1997a. The compositional security checker: A tool for the verification of information flow security properties. IEEE Trans. Softw. Eng. 23.
    • (1997) IEEE Trans. Softw. Eng. , pp. 23
    • Focardi, R.1    Gorrieri, R.2
  • 14
    • 84955565479 scopus 로고    scopus 로고
    • A calculus of mobile agents
    • CONCUR: Proceedings of the International Conference on Concurrency Theory (Pisa, Italy, Aug.) U. Montanari and V. Sassone, eds. Springer-Verlag, New York
    • FOURNET, C., GONTHIER, G., LEVY, J. J., MARGANGET, L., AND REMY, D. 1996. A calculus of mobile agents. In CONCUR: Proceedings of the International Conference on Concurrency Theory (Pisa, Italy, Aug.) U. Montanari and V. Sassone, eds. Lecture Notes in Computer Science, vol. 1119, Springer-Verlag, New York, pp. 406-421.
    • (1996) Lecture Notes in Computer Science , vol.1119 , pp. 406-421
    • Fournet, C.1    Gonthier, G.2    Levy, J.J.3    Marganget, L.4    Remy, D.5
  • 17
    • 0037170503 scopus 로고    scopus 로고
    • Resource access control in systems of mobile agents
    • HENNESSY, M. AND RIELY, J. 2002. Resource access control in systems of mobile agents. Inf. Comput. 173, 82-120.
    • (2002) Inf. Comput. , vol.173 , pp. 82-120
    • Hennessy, M.1    Riely, J.2
  • 18
    • 85022894365 scopus 로고
    • On asynchronous communication semantics
    • Proceedings of the ECOOP '91 Workshop on Object-Based Concurrent Computing, P. Wegner, M. Tokoro, O. Nierstrasz, eds. Springer-Verlag, New York
    • HONDA, K. AND TOKORO, M. 1992. On asynchronous communication semantics. In Proceedings of the ECOOP '91 Workshop on Object-Based Concurrent Computing, P. Wegner, M. Tokoro, O. Nierstrasz, eds. Lecture Notes in Computer Science, vol. 612. Springer-Verlag, New York.
    • (1992) Lecture Notes in Computer Science , vol.612
    • Honda, K.1    Tokoro, M.2
  • 22
    • 0001518312 scopus 로고    scopus 로고
    • Typing and subtyping for mobile processes
    • PIERCE, B. AND SANGIORGI, D. 1996. Typing and subtyping for mobile processes. Math. Struct. Comput. Sci. 6, 5, 409-454. (Extended abstract in LICS '93).
    • (1996) Math. Struct. Comput. Sci. , vol.6 , Issue.5 , pp. 409-454
    • Pierce, B.1    Sangiorgi, D.2
  • 23
    • 0041152689 scopus 로고    scopus 로고
    • PIERCE, B. AND SANGIORGI, D. 1996. Typing and subtyping for mobile processes. Math. Struct. Comput. Sci. 6, 5, 409-454. (Extended abstract in LICS '93).
    • LICS '93
  • 24
    • 0002464962 scopus 로고    scopus 로고
    • Pict: A programming language based on the pi-calculus
    • Gorden Plotkin, Colin Stirling, and Mads Tofte, eds. MIT Press, Cambridge, Mass.
    • PIERCE, B. C. AND TURNER, D. N. 2000. Pict: A programming language based on the pi-calculus. In Proof, Language and Interacting: Essays in Honour of Robin Milner, Gorden Plotkin, Colin Stirling, and Mads Tofte, eds. MIT Press, Cambridge, Mass., pp. 455-494.
    • (2000) Proof, Language and Interacting: Essays in Honour of Robin Milner , pp. 455-494
    • Pierce, B.C.1    Turner, D.N.2
  • 25
    • 84976840591 scopus 로고
    • An axiomatic approach to information flow in programs
    • REITMAS, R. AND ANDREWS, G. 1980. An axiomatic approach to information flow in programs. ACM Trans. Prog. Lang. Syst. 2, 1, 56-76.
    • (1980) ACM Trans. Prog. Lang. Syst. , vol.2 , Issue.1 , pp. 56-76
    • Reitmas, R.1    Andrews, G.2
  • 27
    • 0001868056 scopus 로고
    • Non-interference through determinism
    • European Symposium on Research in Computer Security. Springer-Verlag, New York
    • ROSCOE, A. W., WOODCOCK, J. C. P., AND WULF, L. 1994. Non-interference through determinism. In European Symposium on Research in Computer Security. Lecture Notes in Computer Science, vol. 875. Springer-Verlag, New York.
    • (1994) Lecture Notes in Computer Science , vol.875
    • Roscoe, A.W.1    Woodcock, J.C.P.2    Wulf, L.3
  • 31
    • 84947920982 scopus 로고    scopus 로고
    • Graph types for monadic mobile processes
    • Proceedings of the Foundations of Software Technology and Theoretical Computer Science (FSTTCS). Springer-Verlag, New York
    • YOSHIDA, N. 1996. Graph types for monadic mobile processes. In Proceedings of the Foundations of Software Technology and Theoretical Computer Science (FSTTCS). Lecture Notes in Computer Science, vol. 1180. Springer-Verlag, New York, pp. 371-386.
    • (1996) Lecture Notes in Computer Science , vol.1180 , pp. 371-386
    • Yoshida, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.