메뉴 건너뛰기




Volumn , Issue , 2004, Pages 59-67

Security check: A formal yet practical framework for secure software architecture

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE; LIFE CYCLE; LOGIC CIRCUITS; MATHEMATICAL MODELS; REAL TIME SYSTEMS; SECURITY OF DATA; SET THEORY;

EID: 17644404813     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (26)
  • 1
    • 0023558367 scopus 로고
    • Recognizing safety and liveness
    • B. Alpern and F. Schneider. Recognizing safety and liveness. Distributed Computing, 2(3): 117-126, 1987.
    • (1987) Distributed Computing , vol.2 , Issue.3 , pp. 117-126
    • Alpern, B.1    Schneider, F.2
  • 5
    • 0027342054 scopus 로고
    • The concurrency workbench: A semantics-based tool for the verification of finite-state systems
    • January
    • R. Cleaveland, J. Parrow, and B. Steffen. The Concurrency Workbench: A semantics-based tool for the verification of finite-state systems. ACM Transactions on Programming Languages and Systems, 15(1):36-72, January 1993.
    • (1993) ACM Transactions on Programming Languages and Systems , vol.15 , Issue.1 , pp. 36-72
    • Cleaveland, R.1    Parrow, J.2    Steffen, B.3
  • 7
    • 0023365727 scopus 로고
    • Statecharts: A visual formalism for complex systems
    • D.Harel. Statecharts:a visual formalism for complex systems. Science of Computer Programming,8, pages 231-274, 1987.
    • (1987) Science of Computer Programming , vol.8 , pp. 231-274
    • Harel, D.1
  • 10
    • 0025430066 scopus 로고
    • An implementation of an efficient algorithm for bisimulation equivalence
    • J.-C. Fernandez. An implementation of an efficient algorithm for bisimulation equivalence. Science of Computer Programming, 13:219-236, 1989/1990.
    • (1989) Science of Computer Programming , vol.13 , pp. 219-236
    • Fernandez, J.-C.1
  • 11
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checkeratool for the verification of information flow security policies
    • September
    • R. Focardi and R. Gorrieri. The compositional security checkeratool for the verification of information flow security policies. IEEE Transactions on Software Engineering 23(9):550-571, September 1997.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 13
    • 0025432462 scopus 로고
    • CCS expressions, finite state processes, and three problems of equivalence
    • May
    • P. Kanellakis and S.A. Smolka. CCS expressions, finite state processes, and three problems of equivalence. Information and Computation, 86(1):43-68, May 1990.
    • (1990) Information and Computation , vol.86 , Issue.1 , pp. 43-68
    • Kanellakis, P.1    Smolka, S.A.2
  • 14
    • 49049126479 scopus 로고
    • Results on the prepositional μ-calculus
    • December
    • D. Kozen. Results on the prepositional μ-calculus. Theoretical Computer Science, 27(3):333-354, December 1983.
    • (1983) Theoretical Computer Science , vol.27 , Issue.3 , pp. 333-354
    • Kozen, D.1
  • 17
    • 0023566630 scopus 로고
    • Three partition refinement algorithms
    • December
    • R. Paige and R.E. Tarjan. Three partition refinement algorithms. SIAM Journal of Computing, 16(6):973-989, December 1987.
    • (1987) SIAM Journal of Computing , vol.16 , Issue.6 , pp. 973-989
    • Paige, R.1    Tarjan, R.E.2
  • 18
    • 0003931061 scopus 로고
    • A structural approach to operational semantics
    • Computer Science Department, Aarhus University, Aarhus, Denmark
    • G.D. Plotkin. A structural approach to operational semantics. Technical Report DAIMI-FN-19, Computer Science Department, Aarhus University, Aarhus, Denmark, 1981.
    • (1981) Technical Report , vol.DAIMI-FN-19
    • Plotkin, G.D.1
  • 21
    • 0036132062 scopus 로고    scopus 로고
    • Generic tools for verifying concurrent systems
    • R.Cleaveland and S.Sims, Generic tools for verifying concurrent systems. Science of Computer Programming, 41(1):39-47, 2002.
    • (2002) Science of Computer Programming , vol.41 , Issue.1 , pp. 39-47
    • Cleaveland, R.1    Sims, S.2
  • 23
    • 0012889295 scopus 로고    scopus 로고
    • A language-based approach to security. informatics: 10 years back, 10 years ahead
    • (Reihnard Wilhelm, ed.), Springer-Verlag
    • Fred Schneider. A language-based approach to security. informatics: 10 years back, 10 years ahead. Lecture Notes in Computer Science, Volume 2000 (Reihnard Wilhelm, ed.), Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.2000
    • Schneider, F.1
  • 25
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing fast intrusion detection/prevention systems from high-level specifications
    • R. Sekar and P. Uppuluri. Synthesizing fast intrusion detection/prevention systems from high-level specifications. USENIX Security Symposium, 1999.
    • (1999) USENIX Security Symposium
    • Sekar, R.1    Uppuluri, P.2
  • 26
    • 84974747910 scopus 로고
    • Aggregation and separation as non-interference properties
    • 1992
    • F. Simon. Aggregation and separation as non-interference properties. The Journal Of Computer Security, 1(2): 159-188, 1992., 1992.
    • (1992) The Journal of Computer Security , vol.1 , Issue.2 , pp. 159-188
    • Simon, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.