메뉴 건너뛰기




Volumn 35, Issue 5, 2005, Pages 948-958

On the verification of intransitive noninterference in multilevel security

Author keywords

Denial of service; Formal verification; Information flow; Interference; Intransitive noninterference (INI); Observability; Purge; Security policies

Indexed keywords

ALGORITHMS; AUTOMATA THEORY; FORMAL LANGUAGES; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 26844532854     PISSN: 10834419     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCB.2005.847749     Document Type: Article
Times cited : (62)

References (18)
  • 1
    • 0003400251 scopus 로고
    • "Secure computer system: Unified Eexposition and multics interpretation"
    • Mitre Corporation, Bedford, MA, Tech. Rep. MTR-2997
    • D. E. Bell and L. J. LaPadula, "Secure computer system: Unified Eexposition and multics interpretation," Mitre Corporation, Bedford, MA, Tech. Rep. MTR-2997, 1976.
    • (1976)
    • Bell, D.E.1    LaPadula, L.J.2
  • 3
    • 84974776068 scopus 로고
    • "A classification of security properties for process algebras"
    • R. Focardi and R. Gorrieri, "A classification of security properties for process algebras," J. Comput. Security, vol. 3, no. 1, pp. 5-33, 1994/1995.
    • (1994) J. Comput. Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 5
    • 26844451198 scopus 로고    scopus 로고
    • "Secrecy in security protocols as non interference"
    • presented at the DERA/RHUL Workshop on Secure Architectures and Information Flow
    • R. Focardi, R. Gorrieri, and F. Martinelli, "Secrecy in security protocols as non interference," presented at the DERA/RHUL Workshop on Secure Architectures and Information Flow, 2000.
    • (2000)
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 7
    • 0023292465 scopus 로고
    • "Extending the noninterference version of mls for sat"
    • Feb
    • J. T. Haigh and W. D. Young, "Extending the noninterference version of mls for sat," IEEE Trans. Softw. Eng., vol. 13, no. 2, pp. 141-150, Feb. 1987.
    • (1987) IEEE Trans. Softw. Eng. , vol.13 , Issue.2 , pp. 141-150
    • Haigh, J.T.1    Young, W.D.2
  • 9
    • 1442292328 scopus 로고    scopus 로고
    • "An information flow method to detect denial of service vulnerabilities"
    • S. Lafrance and J. Mullins, "An information flow method to detect denial of service vulnerabilities," J. Univ. Comput. Sci., vol. 9, no. 11, pp. 1350-1369, 2003.
    • (2003) J. Univ. Comput. Sci. , vol.9 , Issue.11 , pp. 1350-1369
    • Lafrance, S.1    Mullins, J.2
  • 10
    • 0023995784 scopus 로고
    • "On observability of discrete-event systems"
    • F. Lin and W. M. Wonham, "On observability of discrete-event systems," Inf. Sci., vol. 44, pp. 173-198, 1988.
    • (1988) Inf. Sci. , vol.44 , pp. 173-198
    • Lin, F.1    Wonham, W.M.2
  • 11
    • 0035075103 scopus 로고    scopus 로고
    • "A cost-based framework for analysis of denial of service networks"
    • C. Meadows, "A cost-based framework for analysis of denial of service networks," J. Comput. Security, vol. 9, no. 1/2, pp. 143-164, 2001.
    • (2001) J. Comput. Security , vol.9 , Issue.1-2 , pp. 143-164
    • Meadows, C.1
  • 12
    • 0042361083 scopus 로고    scopus 로고
    • "Nondeterministic admissible interference"
    • J. Mullins, "Nondeterministic admissible interference," J. Univ. Comput. Sci., vol. 6, no. 11, pp. 1054-1070, 2000.
    • (2000) J. Univ. Comput. Sci. , vol.6 , Issue.11 , pp. 1054-1070
    • Mullins, J.1
  • 13
    • 0023104549 scopus 로고
    • "Supervisory control of a class of discrete-event processes"
    • P. J. Ramadge and W. M. Wonham, "Supervisory control of a class of discrete-event processes," SIAM J. Control Optim., vol. 25, no. 1, pp. 206-230, 1987.
    • (1987) SIAM J. Control Optim. , vol.25 , Issue.1 , pp. 206-230
    • Ramadge, P.J.1    Wonham, W.M.2
  • 14
    • 0032671780 scopus 로고    scopus 로고
    • "What is intransitive noninterference"
    • presented at the 12th IEEE Computer Security Foundations Workshop
    • A. W. Roscoe and M. H. Goldsmith, "What is intransitive noninterference," presented at the 12th IEEE Computer Security Foundations Workshop, 1999.
    • (1999)
    • Roscoe, A.W.1    Goldsmith, M.H.2
  • 15
    • 0003502331 scopus 로고
    • "Noninterference, transitivity and channel-control Security policies"
    • SRI International, Menlo Park, CA, Tech. Rep. CSL-92-02
    • J. Rushby, "Noninterference, transitivity and channel-control Security policies," SRI International, Menlo Park, CA, Tech. Rep. CSL-92-02, 1992.
    • (1992)
    • Rushby, J.1
  • 16
    • 0032646572 scopus 로고    scopus 로고
    • "Process algebra and noninterference"
    • presented at the CSFW-12, Mordano, Italy, Jun
    • P. Y. A. Ryan and S. A. Schneider, "Process algebra and noninterference," presented at the CSFW-12, Mordano, Italy, Jun. 1999.
    • (1999)
    • Ryan, P.Y.A.1    Schneider, S.A.2
  • 17
    • 0000937825 scopus 로고    scopus 로고
    • "Verifying authentication protocols in CSP"
    • Aug
    • S. Schneider, "Verifying authentication protocols in CSP," IEEE Trans. Softw. Eng., vol. 24, no. 8, pp. 447-479, Aug. 1998.
    • (1998) IEEE Trans. Softw. Eng. , vol.24 , Issue.8 , pp. 447-479
    • Schneider, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.