메뉴 건너뛰기




Volumn 2946, Issue , 2004, Pages 1-43

Two formal approaches for approximating noninterference properties

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING; CONSTRAINT THEORY;

EID: 21144453684     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24631-2_1     Document Type: Article
Times cited : (22)

References (59)
  • 1
    • 84944050367 scopus 로고    scopus 로고
    • Probabilistic Information Flow in a Process Algebra
    • Proc. of 12th Int. Conf. on Concurrency Theory (CONCUR'01)
    • A. Aldini. Probabilistic Information Flow in a Process Algebra. In Proc. of 12th Int. Conf. on Concurrency Theory (CONCUR'01), Springer LNCS 2154:152-168, 2001.
    • (2001) Springer LNCS , vol.2154 , pp. 152-168
    • Aldini, A.1
  • 3
    • 3042529082 scopus 로고    scopus 로고
    • A Process-algebraic Approach for the Analysis of Probabilistic Noninterference
    • to appear
    • A. Aldini, M. Bravetti, and R. Gorrieri. A Process-algebraic Approach for the Analysis of Probabilistic Noninterference. Journal of Computer Security, to appear.
    • Journal of Computer Security
    • Aldini, A.1    Bravetti, M.2    Gorrieri, R.3
  • 4
    • 84943242087 scopus 로고    scopus 로고
    • Security Analysis of a Probabilistic Nonrepudiation Protocol
    • Proc. of 2nd Joint Int. Workshop on Process Algebra and Performance Modelling, Probabilistic Methods in Verification (PAPM-ProbMiV'02)
    • A. Aldini and R. Gorrieri. Security Analysis of a Probabilistic Nonrepudiation Protocol. In Proc. of 2nd Joint Int. Workshop on Process Algebra and Performance Modelling, Probabilistic Methods in Verification (PAPM-ProbMiV'02), Springer LNCS 2399:17-36, 2002.
    • (2002) Springer LNCS , vol.2399 , pp. 17-36
    • Aldini, A.1    Gorrieri, R.2
  • 6
    • 58149326570 scopus 로고
    • Axiomatizing Probabilistic Processes: ACP with Generative Probabilities
    • J.C.M. Baeten, J.A. Bergstra, and S.A. Smolka. Axiomatizing Probabilistic Processes: ACP with Generative Probabilities. Information and Computation 121:234-255, 1995.
    • (1995) Information and Computation , vol.121 , pp. 234-255
    • Baeten, J.C.M.1    Bergstra, J.A.2    Smolka, S.A.3
  • 7
    • 84947419887 scopus 로고    scopus 로고
    • Weak Bisimulation for Fully Probabilistic Processes
    • Proc. of 9th Int. Conf. on Computer Aided Verification (CAV'97)
    • C. Baier, and H. Hermanns. Weak Bisimulation for Fully Probabilistic Processes. In Proc. of 9th Int. Conf. on Computer Aided Verification (CAV'97), Springer LNCS 1254:119-130, 1997.
    • (1997) Springer LNCS , vol.1254 , pp. 119-130
    • Baier, C.1    Hermanns, H.2
  • 8
    • 0004287147 scopus 로고    scopus 로고
    • J.A. Bergstra, A. Ponse, and S.A. Smolka (Eds.) Elsevier Science Publishers B.V., Amsterdam
    • J.A. Bergstra, A. Ponse, and S.A. Smolka (Eds.) Handbook of Process Algebra, Elsevier Science Publishers B.V., Amsterdam, 2001.
    • (2001) Handbook of Process Algebra
  • 10
    • 0001786535 scopus 로고    scopus 로고
    • A Formal Approach to the Integration of Performance Aspects in the Modeling and Analysis of Concurrent Systems
    • M. Bernardo, L. Donatiello, and R. Gorrieri. A Formal Approach to the Integration of Performance Aspects in the Modeling and Analysis of Concurrent Systems. Information and Computation 144(2):83-154, 1998.
    • (1998) Information and Computation , vol.144 , Issue.2 , pp. 83-154
    • Bernardo, M.1    Donatiello, L.2    Gorrieri, R.3
  • 13
    • 0037209771 scopus 로고    scopus 로고
    • Discrete Time Generative-reactive Probabilistic Processes with Different Advancing Speeds
    • M. Bravetti and A. Aldini. Discrete Time Generative-reactive Probabilistic Processes with Different Advancing Speeds. Theoretical Computer Science 290(1):355-406, 2003.
    • (2003) Theoretical Computer Science , vol.290 , Issue.1 , pp. 355-406
    • Bravetti, M.1    Aldini, A.2
  • 14
    • 19144372130 scopus 로고    scopus 로고
    • Compositional Asymmetric Cooperations for Process Algebras with Probabilities, Priorities, and Time
    • Proc. of 1st Workshop on Models for Time-Critical Systems (MTCS'00), State College (PA)
    • M. Bravetti and M. Bernardo. Compositional Asymmetric Cooperations for Process Algebras with Probabilities, Priorities, and Time. In Proc. of 1st Workshop on Models for Time-Critical Systems (MTCS'00), State College (PA), ENTCS 39(3), 2000.
    • (2000) ENTCS , vol.39 , Issue.3
    • Bravetti, M.1    Bernardo, M.2
  • 15
    • 84879525367 scopus 로고    scopus 로고
    • Towards Quantitative Verification of Probabilistic Systems
    • (extended abstract). In Proc. of 28th Int. Colloquium on Automata, Languages and Programming (ICALP'01)
    • F. van Breugel, and J. Worrell. Towards Quantitative Verification of Probabilistic Systems (extended abstract). In Proc. of 28th Int. Colloquium on Automata, Languages and Programming (ICALP'01), Springer LNCS 2076:421-432, 2001.
    • (2001) Springer LNCS , vol.2076 , pp. 421-432
    • Van Breugel, F.1    Worrell, J.2
  • 16
    • 0005372979 scopus 로고    scopus 로고
    • Lectures on Formal Methods and Performance Analysis
    • E. Brinksma, H. Hermanns, and J.-P. Katoen (Eds.)
    • E. Brinksma, H. Hermanns, and J.-P. Katoen (Eds.) Lectures on Formal Methods and Performance Analysis, Springer LNCS 2090, 2001.
    • (2001) Springer LNCS , vol.2090
  • 17
    • 0034500567 scopus 로고    scopus 로고
    • Random Oracles in Constantipole: Practical Asynchronous Byzantine Agreement Using Cryptography
    • (extended abstract). ACM Press
    • C. Cachin, K. Kursawe, and V. Shoup. Random Oracles in Constantipole: Practical Asynchronous Byzantine Agreement Using Cryptography (extended abstract). In Proc. of 19th Symposium on Principles of Distributed Computing, ACM Press, pp. 123-132, 2000.
    • (2000) Proc. of 19th Symposium on Principles of Distributed Computing , pp. 123-132
    • Cachin, C.1    Kursawe, K.2    Shoup, V.3
  • 18
    • 35048862565 scopus 로고    scopus 로고
    • Performance Evaluation of Complex Systems: Techniques and Tools
    • M.C. Calzarossa and S. Tucci (Eds.) Performance 2002 Tutorial Lectures
    • M.C. Calzarossa and S. Tucci (Eds.) Performance Evaluation of Complex Systems: Techniques and Tools, Performance 2002 Tutorial Lectures, Springer LNCS 2459, 2002.
    • (2002) Springer LNCS , vol.2459
  • 19
    • 0345275464 scopus 로고    scopus 로고
    • Quantitative Analysis of Leakage of Confidential Data
    • QAPL 2001 - First International Workshop on Quantitative Aspects of Programming Laguages, Elsevier
    • D. Clark, S. Hunt, and P. Malacaria. Quantitative Analysis of Leakage of Confidential Data. In QAPL 2001 - First International Workshop on Quantitative Aspects of Programming Laguages, volume 59 of Electronic Notes in Theoretical Computer Science, Elsevier, 2002.
    • (2002) Electronic Notes in Theoretical Computer Science , vol.59
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 20
    • 0029403439 scopus 로고
    • Nondeterminism and Infinite Computations in Constraint Programming
    • F.S. de Boer, A. Di Pierro, and C. Palamidessi. Nondeterminism and Infinite Computations in Constraint Programming. Theoretical Computer Science, 151(1):37-78, 1995.
    • (1995) Theoretical Computer Science , vol.151 , Issue.1 , pp. 37-78
    • De Boer, F.S.1    Di Pierro, A.2    Palamidessi, C.3
  • 21
    • 84888220414 scopus 로고    scopus 로고
    • Metrics for Labeled Markov Processes
    • Proc. of 10th Int. Conf. on Concurrency Theory (CONCUR'99)
    • J. Desharnais, V. Gupta, R. Jagadeesan, and P. Panangaden. Metrics for Labeled Markov Processes. In Proc. of 10th Int. Conf. on Concurrency Theory (CONCUR'99), Springer LNCS 1664:258-273, 1999.
    • (1999) Springer LNCS , vol.1664 , pp. 258-273
    • Desharnais, J.1    Gupta, V.2    Jagadeesan, R.3    Panangaden, P.4
  • 23
    • 0012799565 scopus 로고    scopus 로고
    • Probabilistic Confinement in a Declarative Framework
    • Declarative Programming - Selected Papers from AGP 2000 - La Havana, Cuba, Elsevier
    • A. Di Pierro, C. Hankin, and H. Wiklicky. Probabilistic Confinement in a Declarative Framework. In Declarative Programming - Selected Papers from AGP 2000 - La Havana, Cuba, volume 48 of Electronic Notes in Theoretical Computer Science, Elsevier, 2001.
    • (2001) Electronic Notes in Theoretical Computer Science , vol.48
    • Di Pierro, A.1    Hankin, C.2    Wiklicky, H.3
  • 24
    • 84958745858 scopus 로고    scopus 로고
    • Analysing Approximate Confinement under Uniform Attacks
    • Proc. of SAS 2002 - 9th Int. Symposium on Static Analysis
    • A. Di Pierro, C. Hankin, and H. Wiklicky. Analysing Approximate Confinement under Uniform Attacks. In Proc. of SAS 2002 - 9th Int. Symposium on Static Analysis, Springer LNCS 2477:310-326, 2002.
    • (2002) Springer LNCS , vol.2477 , pp. 310-326
    • Di Pierro, A.1    Hankin, C.2    Wiklicky, H.3
  • 28
    • 35248857469 scopus 로고    scopus 로고
    • Quantitative Relations and Approximate Process Equivalences
    • Proc. of 14th Int. Conf. on Concurrency Theory (CONCUR'03), Springer Verlag, To appear
    • A. Di Pierro, C. Hankin, and H. Wiklicky. Quantitative Relations and Approximate Process Equivalences. In Proc. of 14th Int. Conf. on Concurrency Theory (CONCUR'03), Lecture Notes in Computer Science, Springer Verlag, 2003. To appear.
    • (2003) Lecture Notes in Computer Science
    • Di Pierro, A.1    Hankin, C.2    Wiklicky, H.3
  • 29
    • 0031645080 scopus 로고    scopus 로고
    • An Operational Semantics for Probabilistic Concurrent Constraint Programming
    • P. Iyer, Y. Choo, and D. Schmidt, Eds., IEEE Computer Society Press
    • A. Di Pierro and H. Wiklicky. An Operational Semantics for Probabilistic Concurrent Constraint Programming. In Proc. of ICCL'98 - Int. Conf. on Computer Languages, P. Iyer, Y. Choo, and D. Schmidt, Eds., pp. 174-183, IEEE Computer Society Press, 1998.
    • (1998) Proc. of ICCL'98 - Int. Conf. on Computer Languages , pp. 174-183
    • Di Pierro, A.1    Wiklicky, H.2
  • 30
    • 84896771832 scopus 로고    scopus 로고
    • Probabilistic Concurrent Constraint Programming: Towards a Fully Abstract Model
    • Proc. of MFCS'98 - Mathematical Foundations of Computer Science, L. Brim, J. Gruska, and J. Zlatuska, Eds.
    • A. Di Pierro and H. Wiklicky. Probabilistic Concurrent Constraint Programming: Towards a Fully Abstract Model. In Proc. of MFCS'98 - Mathematical Foundations of Computer Science, L. Brim, J. Gruska, and J. Zlatuska, Eds., Springer LNCS 1450:446-455, 1998.
    • (1998) Springer LNCS , vol.1450 , pp. 446-455
    • Di Pierro, A.1    Wiklicky, H.2
  • 31
    • 84956972923 scopus 로고    scopus 로고
    • Quantitative Observables and Averages in Probabilistic Concurrent Constraint Programming
    • New Trends in Constraints Selected Papers of the 1999 ERCIM/Compulog Workshop on Constraints, K.R. Apt, T. Kakas, E. Monfroy, and F. Rossi, Eds.
    • A. Di Pierro and H. Wiklicky. Quantitative Observables and Averages in Probabilistic Concurrent Constraint Programming. In New Trends in Constraints Selected Papers of the 1999 ERCIM/Compulog Workshop on Constraints, K.R. Apt, T. Kakas, E. Monfroy, and F. Rossi, Eds., Springer LNCS 1865, 2000.
    • (2000) Springer LNCS , vol.1865
    • Di Pierro, A.1    Wiklicky, H.2
  • 34
    • 35048862075 scopus 로고    scopus 로고
    • Foundations of Security Analysis and Design - Tutorial Lectures
    • R. Focardi and R. Gorrieri (Eds.)
    • R. Focardi and R. Gorrieri (Eds.) Foundations of Security Analysis and Design - Tutorial Lectures, Springer LNCS 2171, 2001.
    • (2001) Springer LNCS , vol.2171
  • 35
    • 0006419926 scopus 로고
    • Reactive, Generative and Stratified Models of Probabilistic Processes
    • R. J. van Glabbeek, S. A. Smolka, and B. Steffen. Reactive, Generative and Stratified Models of Probabilistic Processes. Information and Computation 121:59-80, 1995.
    • (1995) Information and Computation , vol.121 , pp. 59-80
    • Van Glabbeek, R.J.1    Smolka, S.A.2    Steffen, B.3
  • 37
    • 84974759639 scopus 로고
    • Toward a Mathematical Foundation for Information Flow Security
    • J. W. Gray III. Toward a Mathematical Foundation for Information Flow Security. Journal of Computer Security 1:255-294, 1992.
    • (1992) Journal of Computer Security , vol.1 , pp. 255-294
    • Gray III, J.W.1
  • 39
    • 0010974144 scopus 로고    scopus 로고
    • American Mathematical Society, Providence, Rhode Island, second revised edition
    • C.M. Grinstead and J.L. Snell. Introduction to Probability. American Mathematical Society, Providence, Rhode Island, second revised edition, 1997.
    • (1997) Introduction to Probability
    • Grinstead, C.M.1    Snell, J.L.2
  • 45
    • 0003062448 scopus 로고
    • Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Cryptosystems Using Timing Attacks
    • Advances in Cryptology, CRYPTO'95: 15th Annual Int. Cryptology Conf., D. Coppersmith, Ed.
    • P.C. Kocher. Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Cryptosystems Using Timing Attacks. In Advances in Cryptology, CRYPTO'95: 15th Annual Int. Cryptology Conf., D. Coppersmith, Ed., Springer LNCS 963:171-183, 1995.
    • (1995) Springer LNCS , vol.963 , pp. 171-183
    • Kocher, P.C.1
  • 51
    • 84957869855 scopus 로고    scopus 로고
    • A Per Model of Secure Information Flow in Sequential Programs
    • Proc. of European Symp. on Programming (ESOP'99)
    • A. Sabelfeld and D. Sands. A Per Model of Secure Information Flow in Sequential Programs. In Proc. of European Symp. on Programming (ESOP'99), Springer LNCS 1576:40-58, 1999.
    • (1999) Springer LNCS , vol.1576 , pp. 40-58
    • Sabelfeld, A.1    Sands, D.2
  • 58
    • 18544362925 scopus 로고    scopus 로고
    • Probabilistic Noninterference through Weak Probabilistic Bisimulation
    • IEEE CS Press
    • C. Smith. Probabilistic Noninterference through Weak Probabilistic Bisimulation. In Proc. of 16th Computer Security Foundations Workshop (CSFW'03), IEEE CS Press, pp. 3-13, 2003.
    • (2003) Proc. of 16th Computer Security Foundations Workshop (CSFW'03) , pp. 3-13
    • Smith, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.