메뉴 건너뛰기




Volumn , Issue , 2005, Pages 226-240

On declassification and the non-disclosure policy

Author keywords

[No Author keywords available]

Indexed keywords

DECLASSIFICATION; INFORMATION FLOW; INFORMATION FLOW POLICIES; NON-DISCLOSURE POLICY;

EID: 28144441375     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2005.21     Document Type: Conference Paper
Times cited : (43)

References (55)
  • 1
    • 0033702592 scopus 로고    scopus 로고
    • Transforming out timing leaks
    • J. AAAT, Transforming out timing leaks, POPL'00 (2000) 40-53.
    • (2000) POPL'00 , pp. 40-53
    • Aaat, J.1
  • 2
    • 84976840591 scopus 로고
    • An axiomatic approach to information flow in programs
    • G. R. ANDREWS, R.P. REITMAN, An axiomatic approach to information flow in programs, ACM TOPLAS, Vol. 2 No. 1 (1980) 56-76.
    • (1980) ACM TOPLAS , vol.2 , Issue.1 , pp. 56-76
    • Andrews, G.R.1    Reitman, R.P.2
  • 4
    • 4944242009 scopus 로고    scopus 로고
    • Modelling downgrading in information flow security
    • A. BOSSI, C. PIAZZA, S. Rossi, Modelling downgrading in information flow security, CSFW'04 (2004).
    • (2004) CSFW'04
    • Bossi, A.1    Piazza, C.2    Rossi, S.3
  • 5
    • 28144464370 scopus 로고    scopus 로고
    • ULM, a core programming model for global computing
    • ESOP'04
    • G. BOUDOL, ULM, a core programming model for global computing, ESOP'04, Lecture Notes in Comput. Sci. 2986 (2004) 234-248.
    • (2004) Lecture Notes in Comput. Sci. , vol.2986 , pp. 234-248
    • Boudol, G.1
  • 6
    • 0037014243 scopus 로고    scopus 로고
    • Non-interference for concurrent programs and thread systems
    • G. BOUDOL, I. CASTELLANI, Non-interference for concurrent programs and thread systems, Theoretical Comput. Sci. Vol. 281, No. 1 (2002) 109-130.
    • (2002) Theoretical Comput. Sci. , vol.281 , Issue.1 , pp. 109-130
    • Boudol, G.1    Castellani, I.2
  • 7
    • 33646723032 scopus 로고    scopus 로고
    • Quantified interference: Information theory and information flow
    • D. CLARK, S. HUNT, P. MALACARIA, Quantified interference: information theory and information flow, WITS'04 (2004).
    • (2004) WITS'04
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 10
    • 17044427985 scopus 로고    scopus 로고
    • A monadic analysis of information flow security with mutable state
    • K. CRARY, A. KLIGER, F. PFENNING, A monadic analysis of information flow security with mutable state, J. of Functional Programming, Vol. 15 No. 2 (2005) 249-291.
    • (2005) J. of Functional Programming , vol.15 , Issue.2 , pp. 249-291
    • Crary, K.1    Kliger, A.2    Pfenning, F.3
  • 11
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. DENNING, A lattice model of secure information flow, CACM Vol. 19 No. 5 (1976) 236-243.
    • (1976) CACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 14
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • R. FOCARDI, R. GORRIERI, A classification of security properties for process algebras, J. of Computer Security, Vol. 3 No. 1 (1995) 5-33.
    • (1995) J. of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 15
    • 31744437624 scopus 로고    scopus 로고
    • Information flow security in dynamic contexts
    • R. FOCARDI, S. ROSSI, Information flow security in dynamic contexts, CSFW'01 (2001) 307-319.
    • (2001) CSFW'01 , pp. 307-319
    • Focardi, R.1    Rossi, S.2
  • 17
    • 0031701347 scopus 로고    scopus 로고
    • The SLam calculus: Programming with secrecy and integrity
    • N. HEINTZE, J. RIECKE, The SLam calculus: programming with secrecy and integrity, POPL'98 (1998) 365-377.
    • (1998) POPL'98 , pp. 365-377
    • Heintze, N.1    Riecke, J.2
  • 19
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B.W. LAMPSON, A note on the confinement problem, CACM Vol. 16 No. 10 (1973) 613-615.
    • (1973) CACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 20
    • 0001097061 scopus 로고
    • The mechanical evaluation of expressions
    • P. J. LANDIN, The mechanical evaluation of expressions, Computer Journal Vol. 6 (1964) 308-320.
    • (1964) Computer Journal , vol.6 , pp. 308-320
    • Landin, P.J.1
  • 21
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • ESOP'01
    • P. LAUD, Semantics and program analysis of computationally secure information flow, ESOP'01, Lecture Notes in Comput. Sci. 2028 (2001) 77-91.
    • (2001) Lecture Notes in Comput. Sci. , vol.2028 , pp. 77-91
    • Laud, P.1
  • 22
    • 35248840989 scopus 로고    scopus 로고
    • Handling encryption in an analysis for secure information flow
    • ESOP'03
    • P. LAUD, Handling encryption in an analysis for secure information flow, ESOP'03, Lecture Notes in Comput. Sci. 2618 (2003) 159-173.
    • (2003) Lecture Notes in Comput. Sci. , vol.2618 , pp. 159-173
    • Laud, P.1
  • 24
    • 28144461940 scopus 로고    scopus 로고
    • Downgrading policies and relaxed noninterference
    • P. LI, S. ZDANCEWIC, Downgrading policies and relaxed noninterference, POPL'05 (2005) 158-170.
    • (2005) POPL'05 , pp. 158-170
    • Li, P.1    Zdancewic, S.2
  • 25
    • 2042514961 scopus 로고    scopus 로고
    • Semantic models of information flow
    • G. LOWE, Semantic models of information flow, Theoretical Comput. Sci. 315 (2004) 209-256.
    • (2004) Theoretical Comput. Sci. , vol.315 , pp. 209-256
    • Lowe, G.1
  • 26
  • 27
    • 35048815139 scopus 로고    scopus 로고
    • Controlled declassification based on intransitive noninterference
    • APLAS'04
    • H. MANTEL, D. SANDS, Controlled declassification based on intransitive noninterference, APLAS'04, Lecture Notes in Comput. Sci. 3302 (2004) 129-145.
    • (2004) Lecture Notes in Comput. Sci. , vol.3302 , pp. 129-145
    • Mantel, H.1    Sands, D.2
  • 29
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • A. MYERS, JFlow: practical mostly-static information flow control, POPL'99 (1999).
    • (1999) POPL'99
    • Myers, A.1
  • 31
    • 0001048139 scopus 로고    scopus 로고
    • Protecting privacy using the decentralized label model
    • A. C. MYERS, B. LISKOV, Protecting privacy using the decentralized label model, ACM Trans. on Soft. Eng. and Methodology, Vol. 9 No. 4 (2000) 410-442.
    • (2000) ACM Trans. on Soft. Eng. and Methodology , vol.9 , Issue.4 , pp. 410-442
    • Myers, A.C.1    Liskov, B.2
  • 33
    • 0348017041 scopus 로고    scopus 로고
    • Information flow inference for ML
    • F. POTTIER, V. SIMONET, Information flow inference for ML, ACM TOPLAS Vol. 25 No. 1 (2003) 117-158.
    • (2003) ACM TOPLAS , vol.25 , Issue.1 , pp. 117-158
    • Pottier, F.1    Simonet, V.2
  • 34
    • 0032671780 scopus 로고    scopus 로고
    • What is intransitive noninterference?
    • A.W. ROSCOE, M.H. GOLDSMITH, What is intransitive noninterference?, CSFW'99 (1999).
    • (1999) CSFW'99
    • Roscoe, A.W.1    Goldsmith, M.H.2
  • 35
    • 0003502331 scopus 로고
    • Noninterference, transitivity, and channel-control security policies
    • Comput. Sci. Lab. SRI International
    • J. RUSHBY, Noninterference, transitivity, and channel-control security policies, Comput. Sci. Lab. SRI International, Tech. Rep. CSL-92-02 (1992).
    • (1992) Tech. Rep. , vol.CSL-92-02
    • Rushby, J.1
  • 37
    • 0033700286 scopus 로고    scopus 로고
    • Probabilistic noninterference for multi-threaded programs
    • A. SABELFELD, D. SANDS, Probabilistic noninterference for multi-threaded programs, CSFW'00 (2000).
    • (2000) CSFW'00
    • Sabelfeld, A.1    Sands, D.2
  • 39
    • 4944241159 scopus 로고    scopus 로고
    • A model for delimited information release
    • Intern. Symp. on Software Security, to appear
    • A. SABELFELD, A.C. MYERS, A model for delimited information release, Intern. Symp. on Software Security, Lecture Notes in Comput. Sci. to appear (2003).
    • (2003) Lecture Notes in Comput. Sci.
    • Sabelfeld, A.1    Myers, A.C.2
  • 40
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • R. S. SANDHU, Lattice-based access control models, IEEE Computer Vol. 26 No. 11 (1993) 9-19.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 41
    • 24344486699 scopus 로고    scopus 로고
    • The Flow Caml system: Documentation and user's manual
    • V. SIMONET, The Flow Caml system: documentation and user's manual, INRIA Tech. Rep. 0282 (2003).
    • (2003) INRIA Tech. Rep. , vol.282
    • Simonet, V.1
  • 42
    • 0034835461 scopus 로고    scopus 로고
    • A new type system for secure information flow
    • G. SMITH, A new type system for secure information flow, CSFW'01 (2001).
    • (2001) CSFW'01
    • Smith, G.1
  • 43
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • G. SMITH, D. VOLPANO, Secure information flow in a multi-threaded imperative language, POPL'98 (1998).
    • (1998) POPL'98
    • Smith, G.1    Volpano, D.2
  • 45
    • 24644494868 scopus 로고    scopus 로고
    • A design for a security-typed language with certificate-based declassification
    • ESOP'05, to appear
    • S. TSE, S. ZDANCEWIC, A design for a security-typed language with certificate-based declassification, ESOP'05, Lecture Notes in Comput. Sci. to appear (2005).
    • (2005) Lecture Notes in Comput. Sci.
    • Tse, S.1    Zdancewic, S.2
  • 46
    • 0033683194 scopus 로고    scopus 로고
    • Secure introduction of one-way functions
    • D. VOLPANO, Secure introduction of one-way functions, CSFW'00 (2000) 246-254.
    • (2000) CSFW'00 , pp. 246-254
    • Volpano, D.1
  • 47
    • 0030673701 scopus 로고    scopus 로고
    • Eliminating covert flows with minimum typings
    • D. VOLPANO, G. SMITH, Eliminating covert flows with minimum typings, CSFW'97 (1997) 156-168.
    • (1997) CSFW'97 , pp. 156-168
    • Volpano, D.1    Smith, G.2
  • 48
    • 0031633213 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language
    • D. VOLPANO, G. SMITH, Probabilistic noninterference in a concurrent language, CSFW'98 (1998) 34-43.
    • (1998) CSFW'98 , pp. 34-43
    • Volpano, D.1    Smith, G.2
  • 49
    • 0033705210 scopus 로고    scopus 로고
    • Verifying secrets and relative secrecy
    • D. VOLPANO, G. SMITH, Verifying secrets and relative secrecy, POPL'00 (2000) 268-276.
    • (2000) POPL'00 , pp. 268-276
    • Volpano, D.1    Smith, G.2
  • 50
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. VOLPANO, G. SMITH, C. IRVINE, A sound type system for secure flow analysis, J. of Computer Security, Vol. 4, No 3 (1996) 167-187.
    • (1996) J. of Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 51
    • 0003025818 scopus 로고
    • A syntactic approach to type soundness
    • A. WRIGHT, M. FELLEISEN, A syntactic approach to type soundness, Information and Computation Vol. 115 No. 1 (1994) 38-94.
    • (1994) Information and Computation , vol.115 , Issue.1 , pp. 38-94
    • Wright, A.1    Felleisen, M.2
  • 52
    • 4944241703 scopus 로고    scopus 로고
    • A type system for robust declassification
    • MFPS'03
    • S. ZDANCEWIC, A type system for robust declassification, MFPS'03, ENTCS Vol. 83 (2003).
    • (2003) ENTCS , vol.83
    • Zdancewic, S.1
  • 53
    • 51749111025 scopus 로고    scopus 로고
    • Challenges for information-flow security
    • S. ZDANCEWIC, Challenges for information-flow security, PLID'04 (2004).
    • (2004) PLID'04
    • Zdancewic, S.1
  • 54
    • 0036761582 scopus 로고    scopus 로고
    • Secure information how via linear continuations
    • S. ZDANCEWIC, A.C. MYERS, Secure information How via linear continuations, HOSC Vol. 15 No. 2-3 (2002) 209-234.
    • (2002) HOSC , vol.15 , Issue.2-3 , pp. 209-234
    • Zdancewic, S.1    Myers, A.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.