메뉴 건너뛰기




Volumn 135, Issue 1, 2005, Pages 39-58

An automata based approach for verifying information flow properties

Author keywords

Finite state systems; Information flow control; Verification

Indexed keywords

DATA REDUCTION; DECISION MAKING; FINITE AUTOMATA; FLOW CONTROL; SECURITY OF DATA;

EID: 23144453688     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2005.06.005     Document Type: Conference Paper
Times cited : (9)

References (12)
  • 3
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • R. Focardi, and R. Gorrieri The compositional security checker: A tool for the verification of information flow security properties Software Engineering 23 1997 550 571
    • (1997) Software Engineering , vol.23 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 6
    • 84944059120 scopus 로고    scopus 로고
    • Unwinding possibilistic security properties
    • F. Cuppens, Y. Deswarte, D. Gollmann and M. Waidner, editors, European Symposium on Research in Computer Security (ESORICS)
    • Mantel, H., Unwinding Possibilistic Security Properties, in: F. Cuppens, Y. Deswarte, D. Gollmann and M. Waidner, editors, European Symposium on Research in Computer Security (ESORICS), LNCS 1895 (2000), pp. 238-254
    • (2000) LNCS , vol.1895 , pp. 238-254
    • Mantel, H.1
  • 8
    • 0023231848 scopus 로고
    • Specifications for multilevel security and a hookup property
    • McCullough, D., Specifications for multilevel security and a hookup property, in: Proc. 1987 IEEE Symp. Security and Privacy, 1987, pp. 161-166
    • (1987) Proc. 1987 IEEE Symp. Security and Privacy , pp. 161-166
    • McCullough, D.1
  • 9
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • McLean, J., A general theory of composition for trace sets closed under selective interleaving functions, in: Proc. IEEE Symposium on Research in Security and Privacy (1994), pp. 79-93
    • (1994) Proc. IEEE Symposium on Research in Security and Privacy , pp. 79-93
    • McLean, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.