메뉴 건너뛰기




Volumn , Issue , 2005, Pages 255-269

Dimensions and principles of declassification

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; DATA PRIVACY; INFORMATION SCIENCE; PROBLEM SOLVING; SECURITY SYSTEMS; SEMANTICS;

EID: 28144453799     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (192)

References (64)
  • 2
    • 84878558984 scopus 로고    scopus 로고
    • Protection in programming-language translations
    • [Aba98]. Proc. International Colloquium on Automata, Languages and Programming. Springer-Verlag, July
    • [Aba98] M. Abadi. Protection in programming-language translations. In Proc. International Colloquium on Automata, Languages and Programming, volume 1443 of LNCS, pages 868-883. Springer-Verlag, July 1998.
    • (1998) LNCS , vol.1443 , pp. 868-883
    • Abadi, M.1
  • 4
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based access control and secure information flow
    • [BN05], March
    • [BN05] A. Banerjee and D. A. Naumann. Stack-based access control and secure information flow. Journal of Functional Programming, 15(2): 131-177, March 2005.
    • (2005) Journal of Functional Programming , vol.15 , Issue.2 , pp. 131-177
    • Banerjee, A.1    Naumann, D.A.2
  • 5
    • 0038487099 scopus 로고    scopus 로고
    • Intransitive noninterference for cryptographic purposes
    • [BP03], May
    • [BP03] M. Backes and B. Pfitzmann. Intransitive noninterference for cryptographic purposes. In Proc. IEEE Symp. on Security and Privacy, pages 140-153, May 2003.
    • (2003) Proc. IEEE Symp. on Security and Privacy , pp. 140-153
    • Backes, M.1    Pfitzmann, B.2
  • 7
    • 0345275464 scopus 로고    scopus 로고
    • Quantitative analysis of the leakage of confidential data
    • [CHM02]. QAPL'01, Proc. Quantitative Aspects of Programming Languages. Elsevier
    • [CHM02] D. Clark, S. Hunt, and P. Malacaria. Quantitative analysis of the leakage of confidential data. In QAPL'01, Proc. Quantitative Aspects of Programming Languages, volume 59 of ENTCS. Elsevier, 2002.
    • (2002) ENTCS , vol.59
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 12
    • 84976675687 scopus 로고
    • Information transmission in computational systems
    • [Coh77]
    • [Coh77] E. S. Cohen. Information transmission in computational systems. ACM SIGOPS Operating Systems Review, 11 (5): 133-139, 1977.
    • (1977) ACM SIGOPS Operating Systems Review , vol.11 , Issue.5 , pp. 133-139
    • Cohen, E.S.1
  • 13
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • [Coh78]. R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors. Academic Press
    • [Coh78] E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 14
    • 0033718531 scopus 로고    scopus 로고
    • Confidentiality for mobile code: The case of a simple payment protocol
    • [DG00], July
    • [DG00] M. Dam and P. Giambiagi. Confidentiality for mobile code: The case of a simple payment protocol. In Proc. IEEE Computer Security Foundations Workshop, pages 233-244, July 2000.
    • (2000) Proc. IEEE Computer Security Foundations Workshop , pp. 233-244
    • Dam, M.1    Giambiagi, P.2
  • 15
    • 28144434273 scopus 로고    scopus 로고
    • Information flow control for cryptographic applets
    • [DG03], October
    • [DG03] M. Dam and P. Giambiagi. Information flow control for cryptographic applets. Presentation at the Dagstuhl Seminar on Language-Based Security, October 2003. www.dagstuhl.de/03411/Materials/.
    • (2003) Dagstuhl Seminar on Language-based Security
    • Dam, M.1    Giambiagi, P.2
  • 18
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • [FG95]
    • [FG95] R. Focardi and R. Gorrieri. A classification of security properties for process algebras. J. Computer Security, 3(1):5-33, 1995.
    • (1995) J. Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 19
    • 24644477761 scopus 로고    scopus 로고
    • Bridging language-based and process calculi security
    • [FRS05]. Proc. Foundations of Software Science and Computation Structure. Springer-Verlag, April
    • [FRS05] R. Focardi, S. Rossi, and A. Sabelfeld. Bridging language-based and process calculi security. In Proc. Foundations of Software Science and Computation Structure, volume 3441 of LNCS, pages 299-315. Springer-Verlag, April 2005.
    • (2005) LNCS , vol.3441 , pp. 299-315
    • Focardi, R.1    Rossi, S.2    Sabelfeld, A.3
  • 21
    • 35248815514 scopus 로고    scopus 로고
    • On the secure implementation of security protocols
    • [GD03]. Proc. European Symp. on Programming. Springer-Verlag, April
    • [GD03] P. Giambiagi and M. Dam. On the secure implementation of security protocols. In Proc. European Symp. on Programming, volume 2618 of LNCS, pages 144-158. Springer-Verlag, April 2003.
    • (2003) LNCS , vol.2618 , pp. 144-158
    • Giambiagi, P.1    Dam, M.2
  • 24
    • 1442287656 scopus 로고    scopus 로고
    • Abstract noninterference: Parameterizing non-interference by abstract interpretation
    • [GM04], January
    • [GM04] R. Giacobazzi and I. Mastroeni. Abstract noninterference: Parameterizing non-interference by abstract interpretation. In Proc. ACM Symp. on Principles of Programming Languages, pages 186-197, January 2004.
    • (2004) Proc. ACM Symp. on Principles of Programming Languages , pp. 186-197
    • Giacobazzi, R.1    Mastroeni, I.2
  • 25
    • 24644453685 scopus 로고    scopus 로고
    • Adjoining declassification and attack models by abstract interpretation
    • [GM05]. Proc. European Symp. on Programming. Springer-Verlag, April
    • [GM05] R. Giacobazzi and I. Mastroeni. Adjoining declassification and attack models by abstract interpretation. In Proc. European Symp. on Programming, volume 3444 of LNCS, pages 295-310. Springer-Verlag, April 2005.
    • (2005) LNCS , vol.3444 , pp. 295-310
    • Giacobazzi, R.1    Mastroeni, I.2
  • 27
    • 0033751850 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • [JL00]
    • [JL00] R. Joshi and K. R. M. Leino. A semantic approach to secure information flow. Science of Computer Programming, 37(1-3): 113-138, 2000.
    • (2000) Science of Computer Programming , vol.37 , Issue.1-3 , pp. 113-138
    • Joshi, R.1    Leino, K.R.M.2
  • 28
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • [Lau01]. Proc. European Symp. on Programming. Springer-Verlag, April
    • [Lau01] P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. European Symp. on Programming, volume 2028 of LNCS, pages 77-91. Springer-Verlag, April 2001.
    • (2001) LNCS , vol.2028 , pp. 77-91
    • Laud, P.1
  • 29
    • 35248840989 scopus 로고    scopus 로고
    • Handling encryption in an analysis for secure information flow
    • [Lau03]. Proc. European Symp. on Programming. Springer-Verlag, April
    • [Lau03] P. Laud. Handling encryption in an analysis for secure information flow. In Proc. European Symp. on Programming, volume 2618 of LNCS, pages 159-173. Springer-Verlag, April 2003.
    • (2003) LNCS , vol.2618 , pp. 159-173
    • Laud, P.1
  • 34
    • 0033701251 scopus 로고    scopus 로고
    • Possibilistic definitions of security - An assembly kit
    • [Man00], July
    • [Man00] H. Mantel. Possibilistic definitions of security - An assembly kit -. In Proc. IEEE Computer Security Foundations Workshop, pages 185-199, July 2000.
    • (2000) Proc. IEEE Computer Security Foundations Workshop , pp. 185-199
    • Mantel, H.1
  • 35
    • 84881123660 scopus 로고    scopus 로고
    • Information flow control and applications - Bridging a gap
    • [Man01]. Proc. Formal Methods Europe. Springer-Verlag, March
    • [Man01] H. Mantel. Information flow control and applications - Bridging a gap. In Proc. Formal Methods Europe, volume 2021 of LNCS, pages 153-172. Springer-Verlag, March 2001.
    • (2001) LNCS , vol.2021 , pp. 153-172
    • Mantel, H.1
  • 36
    • 0027684079 scopus 로고
    • On abstraction and the expressive power of programming languages
    • [Mit93]
    • [Mit93] J. C. Mitchell. On abstraction and the expressive power of programming languages. Science of Computer Programming, 212:141-163, 1993.
    • (1993) Science of Computer Programming , vol.212 , pp. 141-163
    • Mitchell, J.C.1
  • 37
    • 84945290421 scopus 로고    scopus 로고
    • Probabilistic polynomial-time process calculus and security protocol analysis
    • [Mit01]. Proc. European Symp. on Programming. Springer-Verlag, April
    • [Mit01] J. C. Mitchell. Probabilistic polynomial-time process calculus and security protocol analysis. In Proc. European Symp. on Programming, volume 2028 of LNCS, pages 23-29. Springer-Verlag, April 2001.
    • (2001) LNCS , vol.2028 , pp. 23-29
    • Mitchell, J.C.1
  • 39
    • 0141528662 scopus 로고    scopus 로고
    • A unifying approach to the security of distributed and multi-threaded programs
    • [MS03], September
    • [MS03] H. Mantel and A. Sabelfeld. A unifying approach to the security of distributed and multi-threaded programs. J. Computer Security, 11(4):615-676, September 2003.
    • (2003) J. Computer Security , vol.11 , Issue.4 , pp. 615-676
    • Mantel, H.1    Sabelfeld, A.2
  • 40
    • 35048815139 scopus 로고    scopus 로고
    • Controlled downgrading based on intransitive (non)interference
    • [MS04]. Proc. Asian Symp. on Programming Languages and Systems. Springer-Verlag, November
    • [MS04] H. Mantel and D. Sands. Controlled downgrading based on intransitive (non)interference. In Proc. Asian Symp. on Programming Languages and Systems, volume 3302 of LNCS, pages 129-145. Springer-Verlag, November 2004.
    • (2004) LNCS , vol.3302 , pp. 129-145
    • Mantel, H.1    Sands, D.2
  • 43
    • 0042361083 scopus 로고    scopus 로고
    • Non-deterministic admissible interference
    • [Mul00]
    • [Mul00] J. Mullins. Non-deterministic admissible interference. J. of Universal Computer Science, 6(11):1054-1070, 2000.
    • (2000) J. of Universal Computer Science , vol.6 , Issue.11 , pp. 1054-1070
    • Mullins, J.1
  • 44
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • [Mye99], January
    • [Mye99] A. C. Myers. JFlow: Practical mostly-static information flow control. In Proc. ACM Symp. on Principles of Programming Languages, pages 228-241, January 1999.
    • (1999) Proc. ACM Symp. on Principles of Programming Languages , pp. 228-241
    • Myers, A.C.1
  • 47
    • 0029228214 scopus 로고
    • Absorbing covers and intransitive noninterference
    • [Pin95], May
    • [Pin95] S. Pinsky. Absorbing covers and intransitive noninterference. In Proc. IEEE Symp. on Security and Privacy, pages 102-113, May 1995.
    • (1995) Proc. IEEE Symp. on Security and Privacy , pp. 102-113
    • Pinsky, S.1
  • 48
    • 0000230630 scopus 로고
    • LCF considered as a programming language
    • [Plo77], December
    • [Plo77] G. D. Plotkin. LCF considered as a programming language. Theoretical Computer Science, 5(1):223-255, December 1977.
    • (1977) Theoretical Computer Science , vol.5 , Issue.1 , pp. 223-255
    • Plotkin, G.D.1
  • 52
    • 0003502331 scopus 로고
    • Noninterference, transitivity, and channel-control security policies
    • [Rus92], SRI International
    • [Rus92] J. M. Rushby. Noninterference, transitivity, and channel-control security policies. Technical Report CSL-92-02, SRI International, 1992.
    • (1992) Technical Report , vol.CSL-92-02
    • Rushby, J.M.1
  • 53
    • 84949243805 scopus 로고    scopus 로고
    • Mathematical models of computer security - Tutorial lectures
    • [Rya01]. R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design. Springer-Verlag
    • [Rya01] P. Ryan. Mathematical models of computer security - tutorial lectures. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 1-62. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2171 , pp. 1-62
    • Ryan, P.1
  • 54
    • 84887903550 scopus 로고    scopus 로고
    • Lambda calculi and linear speedups
    • [SGM02]. The essence of computation: complexity, analysis, transformation. Springer-Verlag
    • [SGM02] D. Sands, J. Gustavsson, and A. Moran. Lambda calculi and linear speedups. In The essence of computation: complexity, analysis, transformation, volume 2566 of LNCS, pages 60-82. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2566 , pp. 60-82
    • Sands, D.1    Gustavsson, J.2    Moran, A.3
  • 56
    • 35048828759 scopus 로고    scopus 로고
    • A model for delimited information release
    • [SM04]. Proc. International Symp. on Software Security (ISSS'03). Springer-Verlag, October
    • [SM04] A. Sabelfeld and A. C. Myers. A model for delimited information release. In Proc. International Symp. on Software Security (ISSS'03), volume 3233 of LNCS, pages 174-191. Springer-Verlag, October 2004.
    • (2004) LNCS , vol.3233 , pp. 174-191
    • Sabelfeld, A.1    Myers, A.C.2
  • 58
    • 0035276729 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • [SS01], March
    • [SS01] A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher Order and Symbolic Computation, 14(1):59-91, March 2001.
    • (2001) Higher Order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 59
    • 24644494868 scopus 로고    scopus 로고
    • Designing a security-typed language with certificate-based declassification
    • [TZ05]. Proc. European Symp. on Programming, Springer-Verlag, April
    • [TZ05] S. Tse and S. Zdancewic. Designing a security-typed language with certificate-based declassification. In Proc. European Symp. on Programming, volume 3444 of LNCS, pages 279-294. Springer-Verlag, April 2005.
    • (2005) LNCS , vol.3444 , pp. 279-294
    • Tse, S.1    Zdancewic, S.2
  • 62
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • [VSI96]
    • [VSI96] D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3): 167-187, 1996.
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.