메뉴 건너뛰기




Volumn 3623, Issue , 2005, Pages 365-377

A type system for computationally secure information flow

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; CRYPTOGRAPHY; SECURITY OF DATA;

EID: 26844509701     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11537311_32     Document Type: Conference Paper
Times cited : (35)

References (27)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Abadi, M.: Secrecy by Typing in Security Protocols. Journal of the ACM 46 (1999) 749-786
    • (1999) Journal of the ACM , vol.46 , pp. 749-786
    • Abadi, M.1
  • 2
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • Abadi, M., Blanchet, B.: Secrecy types for asymmetric communication. Theoretical Computer Science 298 (2003) 387-415
    • (2003) Theoretical Computer Science , vol.298 , pp. 387-415
    • Abadi, M.1    Blanchet, B.2
  • 3
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Abadi, M., Gordon, A.: A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation 148 (1999) 1-70
    • (1999) Information and Computation , vol.148 , pp. 1-70
    • Abadi, M.1    Gordon, A.2
  • 4
    • 84978977131 scopus 로고    scopus 로고
    • Formal eavesdropping and its computational interpretation
    • proc. of TACS 2001
    • Abadi, M., Jürjens, J.: Formal Eavesdropping and Its Computational Interpretation. In proc. of TACS 2001 (LNCS 2215), pages 82-94
    • LNCS , vol.2215 , pp. 82-94
    • Abadi, M.1    Jürjens, J.2
  • 5
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • proc. of the International Conference IFIP TCS 2000
    • Abadi, M., Rogaway, P.: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). In proc. of the International Conference IFIP TCS 2000 (LNCS 1872), pages 3-22
    • LNCS , vol.1872 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 6
    • 4944234643 scopus 로고    scopus 로고
    • Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
    • Backes, M., Pfitzmann, B.: Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. In proc. of CSFW 2004, pages 204-218
    • Proc. of CSFW 2004 , pp. 204-218
    • Backes, M.1    Pfitzmann, B.2
  • 7
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. In proc. of FOCS'01, pages 136-145
    • Proc. of FOCS'01 , pp. 136-145
    • Canetti, R.1
  • 8
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning, D.: A Lattice Model of Secure Information Flow. Communications of the ACM 19 (1976) 236-243
    • (1976) Communications of the ACM , vol.19 , pp. 236-243
    • Denning, D.1
  • 9
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning, D., Denning, P.: Certification of Programs for Secure Information Flow. Communications of the ACM 20 (1977) 504-513
    • (1977) Communications of the ACM , vol.20 , pp. 504-513
    • Denning, D.1    Denning, P.2
  • 11
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • proc of. ESOP 2001
    • Laud, P.: Semantics and Program Analysis of Computationally Secure Information Flow. In proc of. ESOP 2001 (LNCS 2028), pages 77-91
    • LNCS , vol.2028 , pp. 77-91
    • Laud, P.1
  • 12
    • 28144443023 scopus 로고    scopus 로고
    • Encryption cycles and two views of cryptography
    • Laud, P.: Encryption Cycles and Two Views of Cryptography. In proc. of Nordsee 2002, pages 85-100
    • Proc. of Nordsee 2002 , pp. 85-100
    • Laud, P.1
  • 13
    • 35248840989 scopus 로고    scopus 로고
    • Handling encryption in analyses for secure information flow
    • proc. of ESOP 2003
    • Laud, P.: Handling Encryption in Analyses for Secure Information Flow. In proc. of ESOP 2003 (LNCS 2618), pages 159-173
    • LNCS , vol.2618 , pp. 159-173
    • Laud, P.1
  • 14
    • 26844509269 scopus 로고    scopus 로고
    • A type system for computationally secure information flow
    • Cybernetica AS, March 7th
    • Laud, P., Vene, V.: A Type System for Computationally Secure Information Flow. Tech. Report IT-LU-O-043-050307, Cybernetica AS, March 7th 2005.
    • (2005) Tech. Report , vol.IT-LU-O-043-050307
    • Laud, P.1    Vene, V.2
  • 16
    • 84958052989 scopus 로고    scopus 로고
    • Probabilistic polynomial-time equivalence and security analysis
    • proc. of the World Congress on Formal Methods in the Development of Computing Systems'99
    • Lincoln, P., Mitchell, J., Mitchell, M., Scedrov, A.: Probabilistic Polynomial-Time Equivalence and Security Analysis. In proc. of the World Congress on Formal Methods in the Development of Computing Systems'99 (LNCS 1708), pages 776-793
    • LNCS , vol.1708 , pp. 776-793
    • Lincoln, P.1    Mitchell, J.2    Mitchell, M.3    Scedrov, A.4
  • 18
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • Myers, A.C.: JFlow: Practical Mostly-Static Information Flow Control. In proc. of POPL'99, pages 228-241
    • Proc. of POPL'99 , pp. 228-241
    • Myers, A.C.1
  • 20
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • Pfitzmann, B., Waidner, M.: A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. In proc. of IEEE S&P 2001, pages 184-200
    • Proc. of IEEE S&P 2001 , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2
  • 21
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • Smith, G., Volpano, D.: Secure Information Flow in a Multi-threaded Imperative Language. In proc. of POPL'98, pages 355-364
    • Proc. of POPL'98 , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 22
    • 0033683194 scopus 로고    scopus 로고
    • Secure introduction of one-way functions
    • Volpano, D.: Secure Introduction of One-way Functions. In proc. of CSFW'00, pages 246-254
    • Proc. of CSFW'00 , pp. 246-254
    • Volpano, D.1
  • 24
    • 0030673701 scopus 로고    scopus 로고
    • Eliminating covert flows with minimum typings
    • Volpano, D.M., Smith, G.: Eliminating Covert Flows with Minimum Typings. In proc. of CSFW'97, pages 156-169
    • Proc. of CSFW'97 , pp. 156-169
    • Volpano, D.M.1    Smith, G.2
  • 25
    • 0031633213 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language
    • Volpano, D., Smith, G.: Probabilistic Noninterference in a Concurrent Language. In proc. of CSFW'98, pages 34-43
    • Proc. of CSFW'98 , pp. 34-43
    • Volpano, D.1    Smith, G.2
  • 26
    • 0033705210 scopus 로고    scopus 로고
    • Verifying secrets and relative secrecy
    • Volpano, D., Smith, G.: Verifying Secrets and Relative Secrecy. In: proc. of POPL 2000, pages 268-276
    • Proc. of POPL 2000 , pp. 268-276
    • Volpano, D.1    Smith, G.2
  • 27
    • 0020301290 scopus 로고    scopus 로고
    • Theory and applications of trapdoor functions
    • Yao, A.: Theory and applications of trapdoor functions (extended abstract). In proc. of FOCS'82, pages 80-91
    • Proc. of FOCS'82 , pp. 80-91
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.