메뉴 건너뛰기




Volumn 12, Issue 1 SPEC. ISS., 2004, Pages 37-81

Approximate non-interference

Author keywords

[No Author keywords available]

Indexed keywords

APPROXIMATION THEORY; COMPUTER PROGRAMMING LANGUAGES; COMPUTER SIMULATION; EQUIVALENCE CLASSES; INFORMATION DISSEMINATION; INFORMATION USE; MARKOV PROCESSES; PROBABILITY; STATISTICAL METHODS;

EID: 0344875573     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/jcs-2004-12103     Document Type: Conference Paper
Times cited : (51)

References (39)
  • 1
    • 0344412458 scopus 로고    scopus 로고
    • On the extension of non-interference with probabilities
    • P. Syverson and J. Guttman, eds, Portland
    • A. Aldini, On the extension of non-interference with probabilities, in: Proceedings of WITS '02 Workshop on Issues in the Theory of Security, P. Syverson and J. Guttman, eds, Portland, 2002, http://www.dsi.unive.it/IFlPWG1_7/WITS2002.
    • (2002) Proceedings of WITS '02 Workshop on Issues in the Theory of Security
    • Aldini, A.1
  • 4
    • 0345275464 scopus 로고    scopus 로고
    • Quantitative analysis of leakage of confidential data
    • QAPL 2001 - First International Workshop on Quantitative Aspects of Programming Laguages
    • D. Clark, S. Hunt and P. Malacaria, Quantitative analysis of leakage of confidential data, in: QAPL 2001 - First International Workshop on Quantitative Aspects of Programming Laguages, Volume 59 of Electronic Notes in Theoretical Computer, 2002.
    • (2002) Electronic Notes in Theoretical Computer , vol.59
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 5
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • Los Angeles
    • P. Cousot and R. Cousot, Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints, in: Symposium on Principles of Programming Languages (POPL), Los Angeles, 1977, pp. 238-252.
    • (1977) Symposium on Principles of Programming Languages (POPL) , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 6
    • 0029403439 scopus 로고
    • Nondeterminism and infinite computations in constraint programming
    • F.S. de Boer, A. Di Pierro and C. Palamidessi, Nondeterminism and infinite computations in constraint programming, Theoretical Computer Science 151(1) (1995), 37-78.
    • (1995) Theoretical Computer Science , vol.151 , Issue.1 , pp. 37-78
    • De Boer, F.S.1    Di Pierro, A.2    Palamidessi, C.3
  • 7
    • 0012799565 scopus 로고    scopus 로고
    • Probabilistic confinement in a declarative framework
    • Declarative Programming - Selected Papers from AGP 2000 - La Havana, Cuba, Elsevier
    • A. Di Pierro, C. Hankin and H. Wiklicky, Probabilistic confinement in a declarative framework, in: Declarative Programming - Selected Papers from AGP 2000 - La Havana, Cuba, Volume 48 of Electronic Notes in Theoretical Computer Science, Elsevier, 2001, pp. 1-23.
    • (2001) Electronic Notes in Theoretical Computer Science , vol.48 , pp. 1-23
    • Di Pierro, A.1    Hankin, C.2    Wiklicky, H.3
  • 8
    • 84958745858 scopus 로고    scopus 로고
    • Analysing approximate confinement under uniform attacks
    • SAS 2002 - 9th International Symposium on Static Analysis, Springer
    • A. Di Pierro, C. Hankin and H. Wiklicky, Analysing approximate confinement under uniform attacks, in: SAS 2002 - 9th International Symposium on Static Analysis, Volume 2477 of Lecture Notes in Computer Science, Springer, 2002, pp. 310-326.
    • (2002) Lecture Notes in Computer Science , vol.2477 , pp. 310-326
    • Di Pierro, A.1    Hankin, C.2    Wiklicky, H.3
  • 9
    • 0031645080 scopus 로고    scopus 로고
    • An operational semantics for Probabilistic Concurrent Constraint Programming
    • P. Iyer, Y. Choo and D. Schmidt, eds, IEEE Computer Society Press
    • A. Di Pierro and H. Wiklicky, An operational semantics for Probabilistic Concurrent Constraint Programming, in: ICCL '98 - International Conference on Computer Languages, P. Iyer, Y. Choo and D. Schmidt, eds, IEEE Computer Society Press, 1998, pp. 174-183.
    • (1998) ICCL '98 - International Conference on Computer Languages , pp. 174-183
    • Di Pierro, A.1    Wiklicky, H.2
  • 10
    • 84896771832 scopus 로고    scopus 로고
    • Probabilistic Concurrent Constraint Programming: Towards a fully abstract model
    • MFCS '98 - Mathematical Foundations of Computer Science, L. Brim, J. Gruska and J. Zlatuska, eds, Berlin - New York, Springer-Verlag
    • A. Di Pierro and H. Wiklicky, Probabilistic Concurrent Constraint Programming: Towards a fully abstract model, in: MFCS '98 - Mathematical Foundations of Computer Science, L. Brim, J. Gruska and J. Zlatuska, eds, Volume 1450 of Lecture Notes in Computer Science, Berlin - New York, 1998, Springer-Verlag, pp. 446-455.
    • (1998) Lecture Notes in Computer Science , vol.1450 , pp. 446-455
    • Di Pierro, A.1    Wiklicky, H.2
  • 11
    • 18444416310 scopus 로고    scopus 로고
    • Quantitative observables and averages in Probabilistic Concurrent Constraint Programming
    • Paphos, Cyprus, K.R. Apt, T. Kakas, E. Monfroy and F. Rossi, eds, number 1865 in Lecture Notes in Computer Science, Berlin-Heidelberg-New York. Springer-Verlag.
    • A. Di Pierro and H. Wiklicky, Quantitative observables and averages in Probabilistic Concurrent Constraint Programming, in: New Trends in Constraints - Selected Papers of the ERCIM/Compulog Workshop on Constraints, October 1999, Paphos, Cyprus, K.R. Apt, T. Kakas, E. Monfroy and F. Rossi, eds, number 1865 in Lecture Notes in Computer Science, Berlin-Heidelberg-New York, 2000. Springer-Verlag.
    • (2000) New Trends in Constraints - Selected Papers of the ERCIM/Compulog Workshop on Constraints, October 1999
    • Di Pierro, A.1    Wiklicky, H.2
  • 12
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • R. Focardi and R. Gorrieri, A classification of security properties for process algebras, Journal of Computer Security 3(1) (1995), 5-33.
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 13
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (Part I: Information Flow)
    • Foundations of Security Analysis and Design - Tutorial Lectures, Springer
    • R. Focardi and R. Gorrieri, Classification of security properties (Part I: Information Flow), in: Foundations of Security Analysis and Design - Tutorial Lectures, Volume 2171 of Lecture Notes in Computer Science, Springer, 2001, pp. 331-396.
    • (2001) Lecture Notes in Computer Science , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 14
    • 0020299523 scopus 로고
    • Security policies and security models
    • IEEE Computer Society Press
    • J. Goguen and J. Meseguer, Security policies and security models, in: IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1982, pp. 11-20.
    • (1982) IEEE Symposium on Security and Privacy , pp. 11-20
    • Goguen, J.1    Meseguer, J.2
  • 20
    • 0003062448 scopus 로고
    • Cryptanalysis of Diffie-Hellman, RSA, DSS, and other cryptosystems using timing attacks
    • Advances in Cryptology, CRYPTO '95:15th Annual International Cryptology Conference, Santa Barbara, California, USA, D. Coppersmith, ed., Berlin-Heidelberg-London, Springer-Verlag
    • P.C. Kocher, Cryptanalysis of Diffie-Hellman, RSA, DSS, and other cryptosystems using timing attacks, in: Advances in Cryptology, CRYPTO '95:15th Annual International Cryptology Conference, Santa Barbara, California, USA, D. Coppersmith, ed., Volume 963 of Lecture Notes in Computer Science, Berlin-Heidelberg-London, 1995, Springer-Verlag, pp. 171-183.
    • (1995) Lecture Notes in Computer Science , vol.963 , pp. 171-183
    • Kocher, P.C.1
  • 21
    • 0026222347 scopus 로고
    • Bisimulation through probabilistic testing
    • K.G. Larsen and A. Skou, Bisimulation through probabilistic testing, Information and Computation 94(1) (1991), 1-28.
    • (1991) Information and Computation , vol.94 , Issue.1 , pp. 1-28
    • Larsen, K.G.1    Skou, A.2
  • 24
    • 0345275457 scopus 로고
    • Formal dependence and independence relations in computer security
    • L. Marcus, Formal dependence and independence relations in computer security, in: Haifa Logic Colloquium, 1995.
    • (1995) Haifa Logic Colloquium
    • Marcus, L.1
  • 25
    • 0003630834 scopus 로고
    • A Calculus of Communicating Systems, Springer-Verlag, Berlin-New York
    • R. Milner, A Calculus of Communicating Systems, Volume 92 of Lecture Notes in Computer Science, Springer-Verlag, Berlin-New York, 1980.
    • (1980) Lecture Notes in Computer Science , vol.92
    • Milner, R.1
  • 27
    • 0035067847 scopus 로고    scopus 로고
    • Process algebra and non-interference
    • Special Issue on CSFW-12
    • P.Y.A. Ryan and S.A. Schneider, Process algebra and non-interference, Journal of Computer Security 9(1/2) (2001), 75-103. Special Issue on CSFW-12.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 75-103
    • Ryan, P.Y.A.1    Schneider, S.A.2
  • 28
    • 84957869855 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • number 1576 in Lecture Notes in Computer Science, Springer-Verlag
    • A. Sabelfeld and D. Sands, A per model of secure information flow in sequential programs, in: ESOP '99, number 1576 in Lecture Notes in Computer Science, Springer-Verlag, 1999, pp. 40-58.
    • (1999) ESOP '99 , pp. 40-58
    • Sabelfeld, A.1    Sands, D.2
  • 33
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • San Diego, California, ACM
    • G. Smith and D. Volpano, Secure information flow in a multi-threaded imperative language, in: Symposium on Principles of Programming Languages (POPL '98), San Diego, California, 1998, ACM, pp. 355-364.
    • (1998) Symposium on Principles of Programming Languages (POPL '98) , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 35
    • 84879525367 scopus 로고    scopus 로고
    • Towards quantitative verification of probabilistic transition systems
    • ICALP: 28th International Colloquium on Automata, Languages and Programming, Springer-Verlag
    • F. van Breugel and J. Worrell, Towards quantitative verification of probabilistic transition systems, in: ICALP: 28th International Colloquium on Automata, Languages and Programming, Volume 2076 of Lecture Notes in Computer Science, Springer-Verlag, 2001, pp. 421-432.
    • (2001) Lecture Notes in Computer Science , vol.2076 , pp. 421-432
    • Van Breugel, F.1    Worrell, J.2
  • 36
    • 0006419926 scopus 로고
    • Reactive, generative and stratified models of probabilistic processes
    • R.J. van Glabbeek, S.A. Smolka and B. Steffen, Reactive, generative and stratified models of probabilistic processes, Information and Computation 121 (1995), 59-80.
    • (1995) Information and Computation , vol.121 , pp. 59-80
    • Van Glabbeek, R.J.1    Smolka, S.A.2    Steffen, B.3
  • 37
    • 0001909368 scopus 로고    scopus 로고
    • Confinement properties for programming languages
    • D. Volpano and G. Smith, Confinement properties for programming languages, SIGACT News 29(3) (1998), 33-42.
    • (1998) SIGACT News , vol.29 , Issue.3 , pp. 33-42
    • Volpano, D.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.