메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 3-13

Probabilistic noninterference through weak probabilistic bisimulation

Author keywords

Application software; Computer languages; Computer science; Computer security; Conferences; Mobile computing; Probability distribution; Processor scheduling; Timing; Yarn

Indexed keywords

APPLICATION PROGRAMS; CHAINS; COMPUTATIONAL LINGUISTICS; COMPUTER PROGRAMMING LANGUAGES; COMPUTER SCIENCE; MARKOV PROCESSES; MOBILE COMPUTING; SCHEDULING; SECURITY OF DATA; SECURITY SYSTEMS; YARN;

EID: 18544362925     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2003.1212701     Document Type: Conference Paper
Times cited : (56)

References (19)
  • 3
    • 84944050367 scopus 로고    scopus 로고
    • Probabilistic information flow in a process algebra
    • Proc. CONCUR 2001 - Concurrency Theory, Aug.
    • A. Aldini. Probabilistic information flow in a process algebra. In Proc. CONCUR 2001 - Concurrency Theory, pages 152-168. Lecture Notes in Computer Science2154, Aug. 2001.
    • (2001) Lecture Notes in Computer Science , vol.2154 , pp. 152-168
    • Aldini, A.1
  • 5
    • 84947419887 scopus 로고    scopus 로고
    • Weak bisimulation for fully probabilistic processes
    • Proc. Computer Aided Verification '97
    • C. Baier and H. Hermanns. Weak bisimulation for fully probabilistic processes. InProc. Computer Aided Verification '97, pages 119-130. Lecture Notes in Computer Science1254, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1254 , pp. 119-130
    • Baier, C.1    Hermanns, H.2
  • 6
    • 84948752619 scopus 로고    scopus 로고
    • Secure information flow and pointer confinement in a java-like language
    • Cape Breton, Nova Scotia, Canada, June
    • A. Banerjee and D. A. Naumann. Secure information flow and pointer confinement in a java-like language. In Proceedings 15th IEEE Computer Security Foundations Workshop, pages 253-267, Cape Breton, Nova Scotia, Canada, June 2002.
    • (2002) Proceedings 15th IEEE Computer Security Foundations Workshop , pp. 253-267
    • Banerjee, A.1    Naumann, D.A.2
  • 9
    • 84947269249 scopus 로고    scopus 로고
    • Secure information flow as typed process behaviour
    • Proceedings 9th European Symposium on Programming, Apr.
    • K. Honda, V. Vasconcelos, and N. Yoshida. Secure information flow as typed process behaviour. In Proceedings 9th European Symposium on Programming, volume 1782 of Lecture Notes in Computer Science, pages 180-199, Apr. 2000.
    • (2000) Lecture Notes in Computer Science , vol.1782 , pp. 180-199
    • Honda, K.1    Vasconcelos, V.2    Yoshida, N.3
  • 12
    • 0026222347 scopus 로고
    • Bisimulation through probabilistic testing
    • K. G. Larsen and A. Skou. Bisimulation through probabilistic testing. Information and Computation, 94(1):1-28, 1991.
    • (1991) Information and Computation , vol.94 , Issue.1 , pp. 1-28
    • Larsen, K.G.1    Skou, A.2
  • 13
    • 0003781238 scopus 로고    scopus 로고
    • Cambridge University Press
    • J. R. Norris. Markov Chains.Cambridge University Press, 1998.
    • (1998) Markov Chains
    • Norris, J.R.1
  • 16
    • 0034835461 scopus 로고    scopus 로고
    • A new type system for secure information flow
    • Cape Breton, Nova Scotia, Canada, June
    • G. Smith. A new type system for secure information flow. In Proceedings 14th IEEE Computer Security Foundations Workshop, pages 115-125, Cape Breton, Nova Scotia, Canada, June 2001.
    • (2001) Proceedings 14th IEEE Computer Security Foundations Workshop , pp. 115-125
    • Smith, G.1
  • 18
    • 0033330060 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language
    • D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. Journal of Computer Security, 7(2,3):231-253, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 231-253
    • Volpano, D.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.