메뉴 건너뛰기




Volumn 60-61, Issue SUPPL., 2004, Pages 353-400

Rule formats for compositional non-interference properties

Author keywords

Non interference; Rule formats; Security theory; Structural operational semantics

Indexed keywords

COMPUTATION THEORY; COMPUTER SIMULATION; ENVIRONMENTAL IMPACT; SECURITY OF DATA; SEMANTICS; SYNTACTICS;

EID: 2942514533     PISSN: 15678326     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jlap.2004.03.003     Document Type: Article
Times cited : (14)

References (35)
  • 1
    • 0011122747 scopus 로고    scopus 로고
    • Structural operational semantics
    • J.A. Bergstra, A. Ponse, & S.A. Smolka. Amsterdam: Elsevier
    • Aceto L., Fokkink W.J., Verhoef C. Structural operational semantics. Bergstra J.A., Ponse A., Smolka S.A. Handbook of Process Algebra. 2001;197-292 Elsevier, Amsterdam.
    • (2001) Handbook of Process Algebra , pp. 197-292
    • Aceto, L.1    Fokkink, W.J.2    Verhoef, C.3
  • 2
    • 84872312669 scopus 로고
    • A comparison of non-interference and non-deducibility using CSP
    • IEEE Computer Society Press
    • P.G. Allen, A comparison of non-interference and non-deducibility using CSP, Proc. IEEE Computer Security Foundation Workshop, IEEE Computer Society Press, 1991, 43-54.
    • (1991) Proc. IEEE Computer Security Foundation Workshop , pp. 43-54
    • Allen, P.G.1
  • 4
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • MITRE MTR-2997
    • D. Bell, L.J. La Padula, Secure computer systems: unified exposition and multics interpretation, Technical Report ESD-TR-75-301, MITRE MTR-2997, 1976.
    • (1976) Technical Report , vol.ESD-TR-75-301
    • Bell, D.1    La Padula, L.J.2
  • 5
    • 0002247730 scopus 로고
    • Structural operational semantics for weak bisimulation
    • Bloom B. Structural operational semantics for weak bisimulation. Theoretical Computer Science. 146(1-2):1995;25-68.
    • (1995) Theoretical Computer Science , vol.146 , Issue.1-2 , pp. 25-68
    • Bloom, B.1
  • 6
    • 35248883450 scopus 로고    scopus 로고
    • A proof system for information flow security
    • Proc. International Workshop on Logic Based Program Development and Transformation, Springer, Berlin
    • A. Bossi, R. Focardi, C. Piazza, S. Rossi, A proof system for information flow security, Proc. International Workshop on Logic Based Program Development and Transformation, Lecture Notes in Computer Science, vol. 2664, Springer, Berlin, 2002, pp. 199-218.
    • (2002) Lecture Notes in Computer Science , vol.2664 , pp. 199-218
    • Bossi, A.1    Focardi, R.2    Piazza, C.3    Rossi, S.4
  • 7
    • 35248852380 scopus 로고    scopus 로고
    • Bisimulation and unwinding for verifying possibilistic security properties
    • Proc. International Conference on Verification, Model Checking and Abstract Interpretation, Springer, Berlin
    • A. Bossi, R. Focardi, C. Piazza, S. Rossi, Bisimulation and unwinding for verifying possibilistic security properties, Proc. International Conference on Verification, Model Checking and Abstract Interpretation, Lecture Notes in Computer Science, vol. 2575, Springer, Berlin, 2003, pp. 223-237.
    • (2003) Lecture Notes in Computer Science , vol.2575 , pp. 223-237
    • Bossi, A.1    Focardi, R.2    Piazza, C.3    Rossi, S.4
  • 8
    • 0142218855 scopus 로고    scopus 로고
    • Information flow security and recursive systems
    • Proc. Italian Conference on Theoretical Computer Science, Springer, Berlin
    • A. Bossi, D. Macedonio, C. Piazza, S. Rossi, Information flow security and recursive systems, Proc. Italian Conference on Theoretical Computer Science, Lecture Notes in Computer Science, vol. 2841, Springer, Berlin, 2003, pp. 369-382.
    • (2003) Lecture Notes in Computer Science , vol.2841 , pp. 369-382
    • Bossi, A.1    Macedonio, D.2    Piazza, C.3    Rossi, S.4
  • 9
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • Focardi R., Gorrieri R. A classification of security properties for process algebras. Journal of Computer Security. 3(1):1995;5-33.
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 10
    • 0001439194 scopus 로고    scopus 로고
    • The compositionality security checker: A tool for the verification of information flow properties
    • Focardi R., Gorrieri R. The compositionality security checker: a tool for the verification of information flow properties. IEEE Transactions on Software Engineering. 23(9):1997;550-571.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 11
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (Part I: Information flow)
    • Foundations of Security Analysis and Design Summer School, Tutorial Lectures, Springer, Berlin
    • R. Focardi, R. Gorrieri, Classification of security properties (Part I: Information flow), in Foundations of Security Analysis and Design Summer School, Tutorial Lectures, Lecture Notes in Computer Science, vol. 2171, Springer, Berlin, 2001, pp. 331-396.
    • (2001) Lecture Notes in Computer Science , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 12
  • 13
    • 0034140160 scopus 로고    scopus 로고
    • Rooted branching bisimulation as a congruence
    • Fokkink W.J. Rooted branching bisimulation as a congruence. Journal of Computer and System Sciences. 60(1):2000;13-37.
    • (2000) Journal of Computer and System Sciences , vol.60 , Issue.1 , pp. 13-37
    • Fokkink, W.J.1
  • 14
    • 0000198242 scopus 로고
    • Structured operational semantics and bisimulation as a congruence
    • Groote J.F., Vaandrager F. Structured operational semantics and bisimulation as a congruence. Information and Computation. 100(2):1992;202-260.
    • (1992) Information and Computation , vol.100 , Issue.2 , pp. 202-260
    • Groote, J.F.1    Vaandrager, F.2
  • 17
    • 0016972709 scopus 로고
    • Formal verification of parallel programs
    • Keller R. Formal verification of parallel programs. Communications of the ACM. 19:1976;371-384.
    • (1976) Communications of the ACM , vol.19 , pp. 371-384
    • Keller, R.1
  • 18
    • 0003067817 scopus 로고
    • Representation of events in nerve nets and finite automata
    • Princeton University Press
    • Kleene S.C. Representation of events in nerve nets and finite automata, Automata Studies. 1956;Princeton University Press. pp. 3-41.
    • (1956) Automata Studies , pp. 3-41
    • Kleene, S.C.1
  • 19
    • 0036083020 scopus 로고    scopus 로고
    • On the composition of secure systems
    • IEEE Computer Society Press
    • H. Mantel, On the composition of secure systems, Proc. IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 2002, pp. 88-101.
    • (2002) Proc. IEEE Symposium on Security and Privacy , pp. 88-101
    • Mantel, H.1
  • 20
    • 0031645024 scopus 로고    scopus 로고
    • Partial model checking and theorem proving for ensuring security properties
    • IEEE Computer Society Press
    • F. Martinelli, Partial model checking and theorem proving for ensuring security properties, Proc. IEEE Computer Security Foundation Workshop, IEEE Computer Society Press, 1998, pp. 44-52.
    • (1998) Proc. IEEE Computer Security Foundation Workshop , pp. 44-52
    • Martinelli, F.1
  • 21
    • 0023231848 scopus 로고
    • Specification for multi-level security and hook-up property
    • IEEE Computer Society Press
    • D. McCullough, Specification for multi-level security and hook-up property, Proc. IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1987, pp. 161-166.
    • (1987) Proc. IEEE Symposium on Security and Privacy , pp. 161-166
    • McCullough, D.1
  • 23
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • IEEE Computer Society Press
    • J. McLean, A general theory of composition for trace sets closed under selective interleaving functions, Proc. IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1994, pp. 79-93.
    • (1994) Proc. IEEE Symposium on Security and Privacy , pp. 79-93
    • McLean, J.1
  • 24
    • 0002426876 scopus 로고    scopus 로고
    • A general theory of composition for a class of "possibilistic" security properties
    • McLean J. A general theory of composition for a class of "possibilistic" security properties. IEEE Transactions on Software Engineering. 22(1):1996;53-67.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 53-67
    • McLean, J.1
  • 25
    • 0000066575 scopus 로고
    • A complete inference system for a class of regular behaviors
    • Milner R. A complete inference system for a class of regular behaviors. Journal of Computer and System Sciences. 28(3):1984;439-466.
    • (1984) Journal of Computer and System Sciences , vol.28 , Issue.3 , pp. 439-466
    • Milner, R.1
  • 27
    • 0003604327 scopus 로고
    • The polyadic π -calculus: A tutorial
    • Department of Computer Science, Edinburgh University
    • R. Milner, The polyadic π -calculus: a tutorial, Technical Report ECS-LFCS-91-180, Department of Computer Science, Edinburgh University, 1991.
    • (1991) Technical Report , vol.ECS-LFCS-91-180
    • Milner, R.1
  • 28
    • 0003931061 scopus 로고
    • A structural approach to operational semantics
    • University of Aarhus
    • G. Plotkin, A structural approach to operational semantics, Technical Report DAIMI FN-19, University of Aarhus, 1981.
    • (1981) Technical Report , vol.DAIMI FN-19
    • Plotkin, G.1
  • 29
    • 0001868056 scopus 로고
    • Non-interference through determinism
    • Proc. European Symposium on Research in Computer Security, Springer, Berlin
    • A.W. Roscoe, J.C.P. Woodcock, L. Wulf, Non-interference through determinism, Proc. European Symposium on Research in Computer Security, Lecture Notes in Computer Science, vol. 875, Springer, Berlin, 1994, pp. 33-53.
    • (1994) Lecture Notes in Computer Science , vol.875 , pp. 33-53
    • Roscoe, A.W.1    Woodcock, J.C.P.2    Wulf, L.3
  • 30
    • 0003706571 scopus 로고
    • A CSP formulation of non-interference and unwinding
    • IEEE Computer Society Press
    • P.Y.A. Ryan, A CSP formulation of non-interference and unwinding, Proc. IEEE Computer Security Foundation Workshop, IEEE Computer Society Press, 1990.
    • (1990) Proc. IEEE Computer Security Foundation Workshop
    • Ryan, P.Y.A.1
  • 31
    • 0022186092 scopus 로고
    • Higher level synchronization devices in SCCS-Meije
    • De Simone R. Higher level synchronization devices in SCCS-Meije. Theoretical Computer Science. 37:1985;245-267.
    • (1985) Theoretical Computer Science , vol.37 , pp. 245-267
    • De Simone, R.1
  • 32
    • 21144445349 scopus 로고    scopus 로고
    • Rule formats for non-interference
    • Proc. European Symposium on Programming, Springer, Berlin
    • S. Tini, Rule formats for non-interference, Proc. European Symposium on Programming, Lecture Notes in Computer Science, vol. 2618, Springer, Berlin, 2003, pp. 129-143.
    • (2003) Lecture Notes in Computer Science , vol.2618 , pp. 129-143
    • Tini, S.1
  • 34
    • 0037057857 scopus 로고    scopus 로고
    • Ordered SOS process languages for branching and eager bisimulations
    • Ulidowski I., Phillips I.C.C. Ordered SOS process languages for branching and eager bisimulations. Information and Computation. 178(1):2002;180-213.
    • (2002) Information and Computation , vol.178 , Issue.1 , pp. 180-213
    • Ulidowski, I.1    Phillips, I.C.C.2
  • 35
    • 0347307535 scopus 로고    scopus 로고
    • The algebra of communicating processes with empty process
    • Vrancken J.L.M. The algebra of communicating processes with empty process. Theoretical Computer Science. 177(2):1997;287-328.
    • (1997) Theoretical Computer Science , vol.177 , Issue.2 , pp. 287-328
    • Vrancken, J.L.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.