메뉴 건너뛰기




Volumn 2618, Issue , 2003, Pages 129-143

Rule formats for non interference

Author keywords

[No Author keywords available]

Indexed keywords

SEMANTICS;

EID: 21144445349     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36575-3_10     Document Type: Article
Times cited : (7)

References (18)
  • 1
    • 17944374564 scopus 로고    scopus 로고
    • Process algebra
    • L. Aceto and W.J. Fokkink, editors
    • L. Aceto and W.J. Fokkink, editors, Special issue on process algebra, Information Processing Letters, 80, 2001.
    • (2001) Information Processing Letters , vol.80 , Issue.SPEC. ISSUE
  • 2
    • 0011122747 scopus 로고    scopus 로고
    • Structural operational semantics
    • J.A. Bergstra, A. Ponse, and S.A. Smolka, editors, Elsevier, Amsterdam
    • L. Aceto, W.J. Fokkink, and C. Verhoef, Structural operational semantics, in J.A. Bergstra, A. Ponse, and S.A. Smolka, editors, Handbook of Process Algebra, Elsevier, Amsterdam, 2001, 197-292.
    • (2001) Handbook of Process Algebra , pp. 197-292
    • Aceto, L.1    Fokkink, W.J.2    Verhoef, C.3
  • 3
    • 84872312669 scopus 로고
    • A comparison of non interference and non deducibility using CSP
    • IEEE Computer Society Press
    • P.G. Allen, A comparison of non interference and non deducibility using CSP, Proc. IEEE Computer Security Foundation Workshop, IEEE Computer Society Press, 1991, 43-54.
    • (1991) Proc. IEEE Computer Security Foundation Workshop , pp. 43-54
    • Allen, P.G.1
  • 5
    • 0002247730 scopus 로고
    • Structural operational semantics for weak bisimulation
    • B. Bloom, Structural operational semantics for weak bisimulation, Theoretical Computer Science, 146, 1995, 25-68.
    • (1995) Theoretical Computer Science , vol.146 , pp. 25-68
    • Bloom, B.1
  • 6
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • R. Focardi and R. Gorrieri, A classification of security properties for process algebras, Journal of Computer Security, 3, 1995, 5-33.
    • (1995) Journal of Computer Security , vol.3 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 7
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • R. Focardi and R. Gorrieri, The compositional security checker: A tool for the verification of information flow security properties, IEEE Transactions on Software Engineering, 23, 1997, 550-571.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 8
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (Part I: Information flow)
    • Foundations of Security Analysis and Design, Tutorial Lectures, Springer, Berlin
    • R. Focardi and R. Gorrieri, Classification of security properties (Part I: Information flow), Foundations of Security Analysis and Design, Tutorial Lectures, Lecture Notes in Computer Science, 2171, Springer, Berlin, 2001, 331-396.
    • (2001) Lecture Notes in Computer Science , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 9
  • 12
    • 0031645024 scopus 로고    scopus 로고
    • Partial model checking and theorem proving for ensuring security properties
    • IEEE Computer Society Press
    • F. Martinelli, Partial model checking and theorem proving for ensuring security properties, Proc. IEEE Computer Security Foundation Workshop, IEEE Computer Society Press, 1998, 44-52.
    • (1998) Proc. IEEE Computer Security Foundation Workshop , pp. 44-52
    • Martinelli, F.1
  • 15
    • 0001868056 scopus 로고
    • Non interference through determinism
    • Proc. European Symposium on Research in Computer Security, Springer, Berlin
    • A.W. Roscoe, J.C.P. Woodcock, and L. Wulf, Non interference through determinism, Proc. European Symposium on Research in Computer Security, Lecture Notes in Computer Science, 875, Springer, Berlin, 1994, 33-53.
    • (1994) Lecture Notes in Computer Science , vol.875 , pp. 33-53
    • Roscoe, A.W.1    Woodcock, J.C.P.2    Wulf, L.3
  • 17
    • 0022186092 scopus 로고
    • Higher level synchronization devices in SCCS-Meije
    • R. De Simone, Higher level synchronization devices in SCCS-Meije, Theoretical Computer Science, 37, 1985, 245-267.
    • (1985) Theoretical Computer Science , vol.37 , pp. 245-267
    • De Simone, R.1
  • 18
    • 84956983460 scopus 로고    scopus 로고
    • Formats of ordered SOS rules with silent actions
    • Proc. Theory and Practice of Software Development, Springer, Berlin
    • I. Ulidowski and I. Phillips, Formats of ordered SOS rules with silent actions, Proc. Theory and Practice of Software Development, Lecture Notes in Computer Science, 1214, Springer, Berlin, 1997, 297-308.
    • (1997) Lecture Notes in Computer Science , vol.1214 , pp. 297-308
    • Ulidowski, I.1    Phillips, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.