메뉴 건너뛰기




Volumn 39, Issue 1, 2004, Pages 186-197

Abstract non-interference: Parameterizing non-interference by abstract interpretation

Author keywords

Abstract domains; Abstract interpretation; Language based security; Non interference

Indexed keywords

ABSTRACTING; COMPUTER AIDED SOFTWARE ENGINEERING; COMPUTER PROGRAMMING LANGUAGES; CONCURRENT ENGINEERING; DATA STRUCTURES; PUBLIC POLICY; SEMANTICS; SYSTEMS ANALYSIS;

EID: 1442287656     PISSN: 03621340     EISSN: None     Source Type: Journal    
DOI: 10.1145/982962.964017     Document Type: Conference Paper
Times cited : (86)

References (40)
  • 1
    • 0348207246 scopus 로고
    • A software validation technique for certification: The methodology
    • Tech. Rep. MTR-2932, MITRE Corp. Badford, MA
    • Bell, D. E., and Burke, E. A software validation technique for certification: The methodology. Tech. Rep. MTR-2932, MITRE Corp. Badford, MA, 1974.
    • (1974)
    • Bell, D.E.1    Burke, E.2
  • 2
    • 0003400257 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • Tech. Rep. M74-244, MITRE Corp. Badford, MA
    • Bell, D. E., and LaPadula, L. J. Secure computer systems: Mathematical foundations and model. Tech. Rep. M74-244, MITRE Corp. Badford, MA, 1973.
    • (1973)
    • Bell, D.E.1    LaPadula, L.J.2
  • 4
    • 0036555709 scopus 로고    scopus 로고
    • Information flow for algol-like languages
    • Clark, D., Hankin, C., and Hunt, S. Information flow for algol-like languages. Computer Languages 28, 1 (2002), 3-28.
    • (2002) Computer Languages , vol.28 , Issue.1 , pp. 3-28
    • Clark, D.1    Hankin, C.2    Hunt, S.3
  • 5
    • 84976675687 scopus 로고
    • Information transmission in computational systems
    • Cohen, E. S. Information transmission in computational systems. ACM SIGOPS Operating System Review 11, 5, (1977), 133-139.
    • (1977) ACM SIGOPS Operating System Review , vol.11 , Issue.5 , pp. 133-139
    • Cohen, E.S.1
  • 6
    • 0037188218 scopus 로고    scopus 로고
    • Constructive design of a hierarchy of semantics of a transition system by abstract interpretation
    • Cousot, P. Constructive design of a hierarchy of semantics of a transition system by abstract interpretation. Theor. Comput. Sci. 277, 1-2, (2002), 47,103.
    • (2002) Theor. Comput. Sci. , vol.277 , Issue.1-2
    • Cousot, P.1
  • 7
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • ACM Press, New York
    • Cousot, P., and Cousot, R. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Conference Record of the 4th ACM Symp. on Principles of Programming Languages (POPL '77) (1977), ACM Press, New York, pp. 238-252.
    • (1977) Conference Record of the 4th ACM Symp. on Principles of Programming Languages (POPL '77) , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 8
    • 84972546036 scopus 로고
    • Constructive versions of Tarski's fixed point theorems
    • Cousot, P., and Cousot, R. Constructive versions of Tarski's fixed point theorems. Pacific J. Math. 82, 1 (1979), 43-57.
    • (1979) Pacific J. Math. , vol.82 , Issue.1 , pp. 43-57
    • Cousot, P.1    Cousot, R.2
  • 12
    • 0041684496 scopus 로고
    • Secure information flow in computer systems
    • PhD thesis, Purdue University
    • Denning, D. E. Secure Information Flow in Computer Systems. PhD thesis, Purdue University. 1975.
    • (1975)
    • Denning, D.E.1
  • 13
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning, D. E. A lattice model of secure information flow. Communications of the ACM 19, 5 (1976), 236-242.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-242
    • Denning, D.E.1
  • 14
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning, D. E., and Denning, P. Certification of programs for secure information flow. Communications of the ACM 20, 7 (1977), 504-513.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.2
  • 16
    • 0001052191 scopus 로고    scopus 로고
    • A unifying view of abstract domain design
    • Filé, G., Giacobazzi, R., and Ranzato, F. A unifying view of abstract domain design. ACM Comput. Surv. 28, 2 (1996), 333-336.
    • (1996) ACM Comput. Surv. , vol.28 , Issue.2 , pp. 333-336
    • Filé, G.1    Giacobazzi, R.2    Ranzato, F.3
  • 17
    • 84890021811 scopus 로고    scopus 로고
    • Incompleteness, counterexamples and refinements in abstract model-checking. In Proc. of The 8th Internat. Static Analysis Symposium, (SAS'01)
    • P. Couost. Ed.; Springer-Verlag
    • Giacobazzi, R., and Quintarelli, E. Incompleteness, counterexamples and refinements in abstract model-checking. In Proc. of The 8th Internat. Static Analysis Symposium, (SAS'01) (2001), P. Couost. Ed., vol. 2126 of Lecture Notes in Computer Science, Springer-Verlag, pp. 356-373.
    • (2001) Lecture Notes in Computer Science , vol.2126 , pp. 356-373
    • Giacobazzi, R.1    Quintarelli, E.2
  • 18
    • 1442284557 scopus 로고    scopus 로고
    • Refining and compressing abstract domains. In Proc. of the 24th Internat. Colloq. on Automata, Languages and Programming (ICALP '97)
    • P. Degano, R. Gorrieri, and A. Marchetti-Spaccamelai Eds.; Springer-Verlag, Berlin
    • Giacobazzi, R., and Ranzato, F. Refining and compressing abstract domains. In Proc. of the 24th Internat. Colloq. on Automata, Languages and Programming (ICALP '97) (1997), P. Degano, R. Gorrieri, and A. Marchetti-Spaccamela, Eds., vol. 1256, of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp. 771-781.
    • (1997) Lecture Notes in Computer Science , vol.1256 , pp. 771-781
    • Giacobazzi, R.1    Ranzato, F.2
  • 19
    • 0032163337 scopus 로고    scopus 로고
    • Optimal domains for disjunctive abstract interpretation
    • Giacobazzi, R., and Ranzato, F. Optimal domains for disjunctive abstract interpretation. Sci. Comput. Program. 32, 1-3 (1998), 177-210.
    • (1998) Sci. Comput. Program , vol.32 , Issue.1-3 , pp. 177-210
    • Giacobazzi, R.1    Ranzato, F.2
  • 20
    • 0000651947 scopus 로고    scopus 로고
    • Making abstract interpretations complete
    • Giacobazzi, R., Ranzato, F., and Scozzari, F. Making abstract interpretations complete. J. of the ACM. 47, 2 (2000), 361-416.
    • (2000) J. of the ACM , vol.47 , Issue.2 , pp. 361-416
    • Giacobazzi, R.1    Ranzato, F.2    Scozzari, F.3
  • 23
    • 0033751850 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • Joshi, R., and Leino, K. R. M. A semantic approach to secure information flow. Sci. Comput. Program. 37 (2000), 113-138.
    • (2000) Sci. Comput. Program , vol.37 , pp. 113-138
    • Joshi, R.1    Leino, K.R.M.2
  • 28
    • 1442284555 scopus 로고
    • Can you trust your data? In Proc. of the 6th Internat. Joint Conf. CAAP/FASE, Theory and Practice of Software Development (TAPSOFT '95)
    • P. Mosses, M. Nielsen, and M. Schwartzbach, Eds.; Springer-Verlag
    • Ørbæk, P. Can you trust your data? In Proc. of the 6th Internat. Joint Conf. CAAP/FASE, Theory and Practice of Software Development (TAPSOFT '95) (1995) P. Mosses, M. Nielsen, and M. Schwartzbach, Eds., vol. 915 of Lecture Notes in Computer Science, Springer-Verlag, pp. 575-589.
    • (1995) Lecture Notes in Computer Science , vol.915 , pp. 575-589
    • Ørbæk, P.1
  • 29
    • 84958765240 scopus 로고    scopus 로고
    • Making abstract model checking strongly preserving. In Proc. of The 9th Internat. Static Analysis Symposium, (SAS'02)
    • M. Hermenegildo and G. Puebla, Eds.; Springer-Verlag
    • Ranzato, F., and Tapparo, F. Making abstract model checking strongly preserving. In Proc. of The 9th Internat. Static Analysis Symposium, (SAS'02) (2002), M. Hermenegildo and G. Puebla, Eds., vol. 2477 of Lecture Notes in Computer Science, Springer-Verlag, pp. 411-427.
    • (2002) Lecture Notes in Computer Science , vol.2477 , pp. 411-427
    • Ranzato, F.1    Tapparo, F.2
  • 31
    • 0035276729 scopus 로고    scopus 로고
    • A PER model of secure information flow in sequential programs
    • Sabelfeld, A., and Sands, D. A PER model of secure information flow in sequential programs. Higher-Order and Symbolic Computation 14, 1 (2001), 59-91.
    • (2001) Higher-Order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 34
    • 84957709924 scopus 로고    scopus 로고
    • Safety versus secrecy. In Proc. of the 6th Internat. Static Analysis Symposium (SAS'99)
    • A Cortesi and G. Filé, Eds.; Springer-Verlag
    • Volpano, D. Safety versus secrecy. In Proc. of the 6th Internat. Static Analysis Symposium (SAS'99) (1999), A Cortesi and G. Filé, Eds., vol. 1694, of Lecture Notes in Computer Science, Springer-Verlag, pp. 303-311.
    • (1999) Lecture Notes in Computer Science , vol.1694 , pp. 303-311
    • Volpano, D.1
  • 36
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Volpano, D., Smith, G., and Irvine, C. A sound type system for secure flow analysis. J. of Computer Security 4 2,3 (1996), 167-187.
    • (1996) J. of Computer Security , vol.4 , Issue.2-3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 39
    • 84958749689 scopus 로고    scopus 로고
    • Security typings by abstract interpretation. In Proc. of The 9th Internat. Static Analysis Symposium, (SAS'02)
    • M. Hermenegildo and H. Puebla, Eds; Springer-Verlag
    • Zanotti, M. Security typings by abstract interpretation. In Proc. of The 9th Internat. Static Analysis Symposium, (SAS'02) (2002) M. Hermenegildo and H. Puebla, Eds, vol. 2477 of Lecture Notes in Computer Science, Springer-Verlag, pp. 360-375.
    • (2002) Lecture Notes in Computer Science , vol.2477 , pp. 360-375
    • Zanotti, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.