메뉴 건너뛰기




Volumn 3444, Issue , 2005, Pages 295-310

Adjoining declassification and attack models by abstract interpretation

Author keywords

Abstract interpretation; Abstract non interference; Adjunction; Attack models; Completeness; Declassification; Language based security

Indexed keywords

COMPUTER PROGRAMMING; COMPUTER PROGRAMMING LANGUAGES; MATHEMATICAL MODELS; SEMANTICS;

EID: 24644453685     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-31987-0_21     Document Type: Conference Paper
Times cited : (18)

References (32)
  • 1
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • MITRE Corp. Badford, MA
    • D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, MITRE Corp. Badford, MA, 1973.
    • (1973) Technical Report , vol.M74-244
    • Bell, D.E.1    LaPadula, L.J.2
  • 3
    • 84937553676 scopus 로고    scopus 로고
    • Static analysis for secrecy and non-interference in networks of processes
    • Proc. of PaCT'01. Springer-Verlag
    • C. Bodei, P. Degano, F. Nielson, and H.R. Nielson. Static analysis for secrecy and non-interference in networks of processes. In Proc. of PaCT'01, volume 2127 of Lecture Notes in Computer Science, pages 27-41. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2127 , pp. 27-41
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Nielson, H.R.4
  • 4
    • 0036555709 scopus 로고    scopus 로고
    • Information flow for algol-like languages
    • D. Clark, C. Hankin, and S. Hunt. Information flow for algol-like languages. Computer Languages, 28(1):3-28, 2002.
    • (2002) Computer Languages , vol.28 , Issue.1 , pp. 3-28
    • Clark, D.1    Hankin, C.2    Hunt, S.3
  • 5
    • 0345275464 scopus 로고    scopus 로고
    • Quantitative analysis of the leakage of confidential data
    • Workshop on Quantitative Aspects of Programming Laquages (QAPL '01). Elsevier, Amsterdam
    • D. Clark, S. Hunt, and P. Malacaria. Quantitative analysis of the leakage of confidential data. In Workshop on Quantitative Aspects of Programming Laquages (QAPL '01), volume 59 of Electronic Notes in Theoretical Computer Science. Elsevier, Amsterdam, 2001.
    • (2001) Electronic Notes in Theoretical Computer Science , vol.59
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 6
    • 84976675687 scopus 로고
    • Information transmission in computational systems
    • E. S. Cohen. Information transmission in computational systems. ACM SIGOPS Operating System Review, 11(5):133-139, 1977.
    • (1977) ACM SIGOPS Operating System Review , vol.11 , Issue.5 , pp. 133-139
    • Cohen, E.S.1
  • 7
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • ACM Press, New York
    • P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proc. of Conf. Record of the 4th ACM Symp. on Principles of Programming Languages (POPL '77), pages 238-252. ACM Press, New York, 1977.
    • (1977) Proc. of Conf. Record of the 4th ACM Symp. on Principles of Programming Languages (POPL '77) , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 9
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-242, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-242
    • Denning, D.E.1
  • 10
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. E. Denning and P. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.2
  • 11
    • 0001052191 scopus 로고    scopus 로고
    • A unifying view of abstract domain design
    • G. Filé, R. Giacobazzi, and F. Ranzato. A unifying view of abstract domain design. ACM Comput. Surv., 28(2):333-336, 1996.
    • (1996) ACM Comput. Surv. , vol.28 , Issue.2 , pp. 333-336
    • Filé, G.1    Giacobazzi, R.2    Ranzato, F.3
  • 12
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • R. Focardi and R. Gorrieri. A classification of security properties for process algebras. Journal of Computer security, 3(1):5-33, 1995.
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 15
    • 84890021811 scopus 로고    scopus 로고
    • Incompleteness, counterexamples and refinements in abstract model-checking
    • P. Cousot, editor, Proc. of The 8th Internat. Static Analysis Symp. (SAS'01). Springer-Ver lag
    • R. Giacobazzi and E. Quintarelli. Incompleteness, counterexamples and refinements in abstract model-checking. In P. Cousot, editor, Proc. of The 8th Internat. Static Analysis Symp. (SAS'01), volume 2126 of Lecture Notes in Computer Science, pages 356-373. Springer-Ver lag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2126 , pp. 356-373
    • Giacobazzi, R.1    Quintarelli, E.2
  • 16
    • 1442284557 scopus 로고    scopus 로고
    • Refining and compressing abstract domains
    • P. Degano, R. Gorrieri, and A. Marchetti-Spaccamela, editors, Proc. of the 24th Internat. Colloq. on Automata, Languages and Programming (ICALP '97). Springer-Verlag, Berlin
    • R. Giacobazzi and P. Ranzato. Refining and compressing abstract domains. In P. Degano, R. Gorrieri, and A. Marchetti-Spaccamela, editors, Proc. of the 24th Internat. Colloq. on Automata, Languages and Programming (ICALP '97), volume 1256 of Lecture Notes in Computer Science, pages 771-781. Springer-Verlag, Berlin, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1256 , pp. 771-781
    • Giacobazzi, R.1    Ranzato, P.2
  • 17
    • 0000651947 scopus 로고    scopus 로고
    • Making abstract interpretations complete
    • R. Giacobazzi, F. Ranzato, and F. Scozzari. Making abstract interpretations complete. J. of the ACM., 47(2):361-416, 2000.
    • (2000) J. of the ACM. , vol.47 , Issue.2 , pp. 361-416
    • Giacobazzi, R.1    Ranzato, F.2    Scozzari, F.3
  • 18
  • 19
    • 0033751850 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • R. Joshi and K. R. M. Leino. A semantic approach to secure information flow. Science of Computer Programming, 37:113-138, 2000.
    • (2000) Science of Computer Programming , vol.37 , pp. 113-138
    • Joshi, R.1    Leino, K.R.M.2
  • 20
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • Programming Languages and Systems, 10th European Symp. On Programming, ESOP. Springer-Verlag
    • P. Laud. Semantics and program analysis of computationally secure information flow. In Programming Languages and Systems, 10th European Symp. On Programming, ESOP, volume 2028 of Lecture Notes in Computer Science, pages 77-91. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2028 , pp. 77-91
    • Laud, P.1
  • 22
    • 0033701251 scopus 로고    scopus 로고
    • Possibilistic definitions of security - An assemply kit
    • IEEE Computer Society Press
    • H. Mantel. Possibilistic definitions of security - an assemply kit -. In Proc. of the IEEE Computer Security Foundations Workshop, pages 185-199. IEEE Computer Society Press, 2000.
    • (2000) Proc. of the IEEE Computer Security Foundations Workshop , pp. 185-199
    • Mantel, H.1
  • 23
    • 84974747891 scopus 로고
    • Proving noninterference and functional correcteness using traces
    • J. McLean. Proving noninterference and functional correcteness using traces. Journal of Computer security, 1(1):37-58, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 37-58
    • McLean, J.1
  • 24
    • 35048869628 scopus 로고    scopus 로고
    • Strong preservation as completeness in abstract interpretation
    • D. Schmidt, editor, Proc. of the 13th European Symposium on Programming (ESOP'04). Springer-Verlag
    • F. Ranzato and F. Tapparo. Strong preservation as completeness in abstract interpretation. In D. Schmidt, editor, Proc. of the 13th European Symposium on Programming (ESOP'04), volume 2986 of Lecture Notes in Computer Science, pages 18-32. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2986 , pp. 18-32
    • Ranzato, F.1    Tapparo, F.2
  • 25
    • 84949243805 scopus 로고    scopus 로고
    • Mathematical models of computer security - Tutorial lectures
    • R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design. Springer-Verlag
    • P. Ryan. Mathematical models of computer security - tutorial lectures. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of Lecture Notes in Computer Science, pages 1-62. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2171 , pp. 1-62
    • Ryan, P.1
  • 28
    • 0035276729 scopus 로고    scopus 로고
    • A PER model of secure information flow in sequential programs
    • A. Sabelfeld and D. Sands. A PER model of secure information flow in sequential programs. Higher-Order and Symbolic Computation, 14(1):59-91, 2001.
    • (2001) Higher-order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 29
    • 0003132401 scopus 로고    scopus 로고
    • Static enforcement of security with types
    • ACM Press, New York
    • C. Skalka and S. Smith. Static enforcement of security with types. In ICFP'00, pages 254-267. ACM Press, New York, 2000.
    • (2000) ICFP'00 , pp. 254-267
    • Skalka, C.1    Smith, S.2
  • 30
    • 84957709924 scopus 로고    scopus 로고
    • Safety versus secrecy
    • Proc. of the 6th Static Analysis Symp. (SAS'99). Springer-Verlag
    • D. Volpano. Safety versus secrecy. In Proc. of the 6th Static Analysis Symp. (SAS'99), volume 1694 of Lecture Notes in Computer Science, pages 303-311. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1694 , pp. 303-311
    • Volpano, D.1
  • 31
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(2,3): 167-187, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.2-3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.