메뉴 건너뛰기




Volumn 40, Issue 1, 2005, Pages 158-170

Downgrading policies and relaxed noninterference

Author keywords

Downgrading policies; Information flow; Language based security; Program equivalence; Relaxed noninterference

Indexed keywords

DOWNGRADING POLICIES; INFORMATION FLOW; LANGUAGE-BASED SECURITY; PROGRAM EQUIVALENCE; RELAXED NONINTERFERENCE;

EID: 17044394239     PISSN: 03621340     EISSN: None     Source Type: Journal    
DOI: 10.1145/1047659.1040319     Document Type: Conference Paper
Times cited : (22)

References (20)
  • 4
  • 5
    • 0026157130 scopus 로고
    • Towards a mathematical foundation for information flow security
    • IEEE Computer Society Press
    • James W. Gray, III. Towards a mathematical foundation for information flow security. In Proc. IEEE Symposium on Security and Privacy, pages 21-34. IEEE Computer Society Press, 1991.
    • (1991) Proc. IEEE Symposium on Security and Privacy , pp. 21-34
    • Gray III, J.W.1
  • 7
    • 35048815139 scopus 로고    scopus 로고
    • Controlled declassification based on intransitive noninterference
    • Proceedings of The Second Asian Symposium on Programming Languages and Systems. Springer
    • Heiko Mantel and David Sands. Controlled declassification based on intransitive noninterference. In Proceedings of The Second Asian Symposium on Programming Languages and Systems, volume 3302 of LNCS. Springer, 2004.
    • (2004) LNCS , vol.3302
    • Mantel, H.1    Sands, D.2
  • 8
    • 0025139568 scopus 로고
    • Security models and information flow
    • IEEE Computer Society Press
    • John McLean. Security models and information flow. In Proc. IEEE Symposium on Security and Privacy, pages 180-187. IEEE Computer Society Press, 1990.
    • (1990) Proc. IEEE Symposium on Security and Privacy , pp. 180-187
    • McLean, J.1
  • 19
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Dennis Volpano, Geoffrey Smith, and Cynthia Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.