메뉴 건너뛰기




Volumn 11, Issue 4, 2003, Pages 615-676

A unifying approach to the security of distributed and multi-threaded programs

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAM LISTINGS; COMPUTER PROGRAMMING LANGUAGES; DISTRIBUTED COMPUTER SYSTEMS; LARGE SCALE SYSTEMS; PROBLEM SOLVING; THEOREM PROVING;

EID: 0141528662     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2003-11406     Document Type: Conference Paper
Times cited : (41)

References (50)
  • 7
    • 84976675687 scopus 로고
    • Information transmission in computational systems
    • E.S. Cohen, Information transmission in computational systems, ACM SIGOPS Operating Systems Review 11(5) (1977), 133-139.
    • (1977) ACM SIGOPS Operating Systems Review , vol.11 , Issue.5 , pp. 133-139
    • Cohen, E.S.1
  • 8
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • R.A. DeMillo, D.P. Dobkin, A.K. Jones and R.J. Lipton, eds, Academic Press
    • E.S. Cohen, Information transmission in sequential programs, in: Foundations of Secure Computation, R.A. DeMillo, D.P. Dobkin, A.K. Jones and R.J. Lipton, eds, Academic Press, 1978, pp. 297-335.
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 10
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D.E. Denning, A lattice model of secure information flow, Communications of the ACM 19(5) (1976), 236-243.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 11
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D.E. Denning and P.J. Denning, Certification of programs for secure information flow, Communications of the ACM 20(7) (1977), 504-513.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 12
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • R. Focardi and R. Gorrieri, A classification of security properties for process algebras, Journal of Computer Security 3(1) (1995), 5-33.
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 21
    • 0033751850 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • R. Joshi and K.R.M. Leino, A semantic approach to secure information flow, Science of Computer Programming 37(1-3) (2000), 113-138.
    • (2000) Science of Computer Programming , vol.37 , Issue.1-3 , pp. 113-138
    • Joshi, R.1    Leino, K.R.M.2
  • 23
    • 84944059120 scopus 로고    scopus 로고
    • Unwinding possibilistic security properties
    • Proceedings of the European Symposium on Research in Computer Security, Springer-Verlag
    • H. Mantel, Unwinding possibilistic security properties, in: Proceedings of the European Symposium on Research in Computer Security, Volume 1895 of LNCS, Springer-Verlag, 2000, pp. 238-254.
    • (2000) LNCS , vol.1895 , pp. 238-254
    • Mantel, H.1
  • 24
    • 84881123660 scopus 로고    scopus 로고
    • Information flow control and applications - Bridging a gap
    • Proceedings of the International Symposium of Formal Methods Europe, Springer-Verlag
    • H. Mantel, Information flow control and applications - Bridging a gap. in: Proceedings of the International Symposium of Formal Methods Europe, Volume 2021 of LNCS, Springer-Verlag, 2001, pp. 153-172.
    • (2001) LNCS , vol.2021 , pp. 153-172
    • Mantel, H.1
  • 30
    • 84974747891 scopus 로고
    • Proving noninterference and functional correctness using traces
    • J. McLean, Proving noninterference and functional correctness using traces. Journal of Computer Security 1(1) (1992), 37-58.
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 37-58
    • McLean, J.1
  • 31
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • J. McLean, A general theory of composition for trace sets closed under selective interleaving functions, in: Proceedings of the IEEE Symposium on Security and Privacy. 1994, pp. 79-93.
    • (1994) Proceedings of the IEEE Symposium on Security and Privacy , pp. 79-93
    • McLean, J.1
  • 33
    • 0001868056 scopus 로고
    • Non-interference through determinism
    • Proceedings of the European Symposium on Research in Computer Security, Springer-Verlag
    • A.W. Roscoe, J.C.P. Woodcock and L. Wulf, Non-interference through determinism, in: Proceedings of the European Symposium on Research in Computer Security, Volume 875 of LNCS, Springer-Verlag, 1994, pp. 33-53.
    • (1994) LNCS , vol.875 , pp. 33-53
    • Roscoe, A.W.1    Woodcock, J.C.P.2    Wulf, L.3
  • 35
    • 84885715358 scopus 로고    scopus 로고
    • The impact of synchronisation on secure information flow in concurrent programs
    • Proceedings of the Andrei Ershov International Conference on Perspectives of System Informatics, Springer-Verlag
    • A. Sabelfeld, The impact of synchronisation on secure information flow in concurrent programs, in: Proceedings of the Andrei Ershov International Conference on Perspectives of System Informatics, Volume 2244 of LNCS, Springer-Verlag, 2001, pp. 227-241.
    • (2001) LNCS , vol.2244 , pp. 227-241
    • Sabelfeld, A.1
  • 36
    • 84958755151 scopus 로고    scopus 로고
    • Static confidentiality enforcement for distributed programs
    • Proceedings of the International Symposium on Static Analysis, Springer-Verlag
    • A. Sabelfeld and H. Mantel, Static confidentiality enforcement for distributed programs, in: Proceedings of the International Symposium on Static Analysis. Volume 2477 of LNCS, Springer-Verlag, 2002, pp. 376-394.
    • (2002) LNCS , vol.2477 , pp. 376-394
    • Sabelfeld, A.1    Mantel, H.2
  • 39
    • 0035276729 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • A. Sabelfeld and D. Sands, A per model of secure information flow in sequential programs, Higher Order and Symbolic Computation 14(1) (2001), 59-91.
    • (2001) Higher Order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 44
    • 0033330060 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language
    • D. Volpano and G. Smith, Probabilistic noninterference in a concurrent language, Journal of Computer Security 7(2-3) (1999), 231-253.
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 231-253
    • Volpano, D.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.