메뉴 건너뛰기




Volumn 3450, Issue , 2005, Pages 193-209

A theorem proving approach to analysis of secure information flow

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION (OF INFORMATION); COMPUTATIONAL METHODS; COMPUTER AIDED SOFTWARE ENGINEERING; COMPUTER SOFTWARE; FORMAL LOGIC; JAVA PROGRAMMING LANGUAGE; SECURITY OF DATA; THEOREM PROVING;

EID: 24644445710     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-32004-3_20     Document Type: Conference Paper
Times cited : (129)

References (19)
  • 1
    • 14844353524 scopus 로고    scopus 로고
    • A theorem proving approach to analysis of secure information flow
    • Department of Computing Science, Chalmers University of Technology and Göteborg University
    • Ádám Darvas, R. Hähnle, and D. Sands, A theorem proving approach to analysis of secure information flow. Technical Report 2004-01, Department of Computing Science, Chalmers University of Technology and Göteborg University, 2004.
    • (2004) Technical Report , vol.2004 , Issue.1
    • Darvas, Á.1    Hähnle, R.2    Sands, D.3
  • 4
    • 84944238972 scopus 로고    scopus 로고
    • A dynamic logic for the formal verification of Java Card programs
    • B. Beckert. A dynamic logic for the formal verification of Java Card programs. In Java on Smart Cards: Programming and Security, pages 6-24, 2001.
    • (2001) Java on Smart Cards: Programming and Security , pp. 6-24
    • Beckert, B.1
  • 5
    • 35248846009 scopus 로고    scopus 로고
    • A program logic for handling Java Card's transaction mechanism
    • April
    • B. Beckert and W. Mostowski. A program logic for handling Java Card's transaction mechanism. In Proc. FASE, pages 246-260, April 2003.
    • (2003) Proc. FASE , pp. 246-260
    • Beckert, B.1    Mostowski, W.2
  • 6
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • Academic Press
    • E. S. Cohen. Information transmission in sequential programs. In Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 7
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Commun. ACM, 20(7):504-513, July 1977.
    • (1977) Commun. ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 8
    • 24644510261 scopus 로고    scopus 로고
    • A theorem prover for program checking
    • Compaq SRC
    • D. L. Detlefs, G. Nelson, and J. B. Saxe. A theorem prover for program checking. Research report 178, Compaq SRC, 2002.
    • (2002) Research Report , vol.178
    • Detlefs, D.L.1    Nelson, G.2    Saxe, J.B.3
  • 11
    • 0033751850 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • R. Joshi and K. R. M. Leino. A semantic approach to secure information flow. Science of Computer Programming, 37(1-3):113-138, 2000.
    • (2000) Science of Computer Programming , vol.37 , Issue.1-3 , pp. 113-138
    • Joshi, R.1    Leino, K.R.M.2
  • 12
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending UML for secure systems development
    • J. Jürjens. UMLsec: Extending UML for secure systems development. In Proc. U ML, pages 412-425, 2002.
    • (2002) Proc. UML , pp. 412-425
    • Jürjens, J.1
  • 13
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • Jan.
    • A. C. Myers. JFlow: Practical mostly-static information flow control. In Proc. POPL, pages 228-241, Jan. 1999.
    • (1999) Proc. POPL , pp. 228-241
    • Myers, A.C.1
  • 14
    • 0036037318 scopus 로고    scopus 로고
    • Information flow inference for ML
    • Jan.
    • F. Pottier and V. Simonet. Information flow inference for ML. In Proc. POPL, pages 319-330, Jan. 2002.
    • (2002) Proc. POPL , pp. 319-330
    • Pottier, F.1    Simonet, V.2
  • 17
    • 0035276729 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • March
    • A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher-Order and Symbolic Computation, 14(1):59-91, March 2001.
    • (2001) Higher-order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 18
    • 14844366955 scopus 로고    scopus 로고
    • Verification of JavaCard programs
    • Institut für Informatik, Universität Augsburg, Germany
    • K. Stenzel. Verification of JavaCard programs. Technical report 2001-5, Institut für Informatik, Universität Augsburg, Germany, 2001.
    • (2001) Technical Report , vol.2001 , Issue.5
    • Stenzel, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.