메뉴 건너뛰기




Volumn , Issue , 2005, Pages 16-30

Achieving information flow security through precise control of effects

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; COMPUTER SOFTWARE; MATHEMATICAL MODELS;

EID: 28144451172     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (16)

References (49)
  • 3
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • The MITRE Corp., Bedford MA, May
    • D. Bell and L. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, The MITRE Corp., Bedford MA, May 1973.
    • (1973) Technical Report , vol.M74-244
    • Bell, D.1    LaPadula, L.2
  • 4
    • 0024772234 scopus 로고
    • Kit: A study in operating system verification
    • W. R. Bevier. Kit: A study in operating system verification. IEEE Transactions on Software Engineering, 15(11):1382-1396, 1989.
    • (1989) IEEE Transactions on Software Engineering , vol.15 , Issue.11 , pp. 1382-1396
    • Bevier, W.R.1
  • 5
    • 0004096237 scopus 로고    scopus 로고
    • Prentice-Hall Series in Computer Science. Prentice-Hall Europe, London, UK, second edition
    • R. Bird. Introduction to Functional Programming using Haskell, Prentice-Hall Series in Computer Science. Prentice-Hall Europe, London, UK, second edition, 1998.
    • (1998) Introduction to Functional Programming Using Haskell
    • Bird, R.1
  • 8
    • 0004059519 scopus 로고
    • PhD thesis, Columbia University
    • D. Espinosa. Semantic Lego, PhD thesis, Columbia University, 1995.
    • (1995) Semantic Lego
    • Espinosa, D.1
  • 10
    • 28144458250 scopus 로고    scopus 로고
    • The Fox project: Advanced language technology for extensible systems
    • School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, January
    • R. Harper, P. Lee, and F. Pfenning. The Fox project: Advanced language technology for extensible systems. Technical Report CMU-CS-98-107, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, January 1998.
    • (1998) Technical Report , vol.CMU-CS-98-107
    • Harper, R.1    Lee, P.2    Pfenning, F.3
  • 13
    • 84976498283 scopus 로고    scopus 로고
    • Metacomputation-based compiler architecture
    • 5th International Conference on the Mathematics of Program Construction, Ponte de Lima, Portugal. Springer-Verlag
    • W. Harrison and S. Kamin. Metacomputation-based compiler architecture. In 5th International Conference on the Mathematics of Program Construction, Ponte de Lima, Portugal, volume 1837 of Lecture Notes in Computer Science, pages 213-229. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1837 , pp. 213-229
    • Harrison, W.1    Kamin, S.2
  • 15
    • 0033751850 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • May
    • R. Joshi and K. Leino. A semantic approach to secure information flow. Science of Computer Programming, 37(1-3): 113-138, May 2000.
    • (2000) Science of Computer Programming , vol.37 , Issue.1-3 , pp. 113-138
    • Joshi, R.1    Leino, K.2
  • 16
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • ACM press, Oct.
    • B. Lampson. A note on the confinement problem. In Communications of the ACM, pages 613-615. ACM press, Oct. 1973.
    • (1973) Communications of the ACM , pp. 613-615
    • Lampson, B.1
  • 22
  • 23
  • 24
    • 0000046942 scopus 로고
    • A security flow control algorithm and its denotational semantics correctness proof
    • M. Mizuno and D. Schmidt. A security flow control algorithm and its denotational semantics correctness proof. Formal Aspects of Computing, 4(6A):727-754, 1992.
    • (1992) Formal Aspects of Computing , vol.4 , Issue.6 A , pp. 727-754
    • Mizuno, M.1    Schmidt, D.2
  • 25
    • 0003457308 scopus 로고
    • An abstract view of programming languages
    • Dept. of Computer Science, Edinburgh Univ.
    • E. Moggi. An abstract view of programming languages. Technical Report ECS-LFCS-90-113, Dept. of Computer Science, Edinburgh Univ., 1990.
    • (1990) Technical Report , vol.ECS-LFCS-90-113
    • Moggi, E.1
  • 26
    • 0026188821 scopus 로고
    • Notions of computation and monads
    • E. Moggi. Notions of computation and monads. Information and Computation, 93(1):55-92, 1991.
    • (1991) Information and Computation , vol.93 , Issue.1 , pp. 55-92
    • Moggi, E.1
  • 27
    • 0347229432 scopus 로고
    • A provably secure operating system: The system, its applications, and proof
    • SRI, May
    • P. Neumann, R. Boyer, R. Feiertag, K. Levitt, and L. Robinson. A provably secure operating system: The system, its applications, and proof. Technical Report CSL-116, SRI, May 1980.
    • (1980) Technical Report , vol.CSL-116
    • Neumann, P.1    Boyer, R.2    Feiertag, R.3    Levitt, K.4    Robinson, L.5
  • 30
    • 18844483225 scopus 로고    scopus 로고
    • A resumption monad transformer and its applications in the semantics of concurrency
    • Anogia, Crete
    • N. Papaspyrou. A resumption monad transformer and its applications in the semantics of concurrency. In Proceedings of the 3rd Panhellenic Logic Symposium, Anogia, Crete, 2001.
    • (2001) Proceedings of the 3rd Panhellenic Logic Symposium
    • Papaspyrou, N.1
  • 31
    • 18844483225 scopus 로고    scopus 로고
    • A Resumption Monad Transformer and its Applications in the Semantics of Concurrency
    • Anogia, Crete, July 17-22
    • N. S. Papaspyrou. A Resumption Monad Transformer and its Applications in the Semantics of Concurrency. In Proceedings of the 3rd Panhellenic Logic Symposium, Anogia, Crete, July 17-22, 2001.
    • (2001) Proceedings of the 3rd Panhellenic Logic Symposium
    • Papaspyrou, N.S.1
  • 38
    • 0020919435 scopus 로고
    • Types, abstraction and parametric polymorphism
    • R. E. A. Mason, editor. North-Holland
    • J. C. Reynolds. Types, abstraction and parametric polymorphism. In R. E. A. Mason, editor, Information Processing 83, pages 513-523. North-Holland, 1983.
    • (1983) Information Processing , vol.83 , pp. 513-523
    • Reynolds, J.C.1
  • 41
    • 0020273088 scopus 로고
    • Proof of separability: A verification technique for a class of security kernels
    • Berlin. Springer-Verlag
    • th International Symposium on Programming, pages 352-362, Berlin, 1982. Springer-Verlag.
    • (1982) th International Symposium on Programming , pp. 352-362
    • Rushby, J.1
  • 44
    • 0034835461 scopus 로고    scopus 로고
    • A new type system for secure information flow
    • IEEE Computer Society Press
    • G. Smith. A new type system for secure information flow. In 14th IEEE Computer Security Foundations Workshop (CSFW '01), pages 115-125. IEEE Computer Society Press, 2001.
    • (2001) 14th IEEE Computer Security Foundations Workshop (CSFW '01) , pp. 115-125
    • Smith, G.1
  • 47
    • 0018983212 scopus 로고
    • Specification and verification of the UCLA Unix security kernel
    • B. Walker, R. Kemmerer, and G. Popek. Specification and verification of the UCLA Unix security kernel. Communications of the ACM, 23(2):118-131, 1980.
    • (1980) Communications of the ACM , vol.23 , Issue.2 , pp. 118-131
    • Walker, B.1    Kemmerer, R.2    Popek, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.