메뉴 건너뛰기




Volumn 12, Issue 2, 2004, Pages 191-245

A process-algebraic approach for the analysis of probabilistic noninterference

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRA; DATA PROCESSING; FREQUENCIES; MATHEMATICAL MODELS; PROBABILITY;

EID: 3042529082     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2004-12202     Document Type: Article
Times cited : (74)

References (62)
  • 3
    • 3042529082 scopus 로고    scopus 로고
    • A process-algebraic approach for the analysis of probabilistic non-interference
    • University of Bologna, Italy
    • A. Aldini, M. Bravetti and R. Gorrieri, A process-algebraic approach for the analysis of probabilistic non-interference, Technical Report UBLCS-2002-02, University of Bologna, Italy, 2002, ftp://ftp.es.unibo.it/pub/techreports/
    • (2002) Technical Report , vol.UBLCS-2002-02
    • Aldini, A.1    Bravetti, M.2    Gorrieri, R.3
  • 7
    • 58149326570 scopus 로고
    • Axiomatizing probabilistic processes: ACP with generative probabilities
    • J.C.M. Baeten, J.A. Bergstra and S.A. Smolka, Axiomatizing probabilistic processes: ACP with generative probabilities, Information and Computation 121 (1995), 234-255.
    • (1995) Information and Computation , vol.121 , pp. 234-255
    • Baeten, J.C.M.1    Bergstra, J.A.2    Smolka, S.A.3
  • 9
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • The MITRE Corporation, Bedford, MA
    • D.E. Bell and L.J. La Padula, Secure computer systems: mathematical foundations and model, Technical Report M74-244, The MITRE Corporation, Bedford, MA, 1973.
    • (1973) Technical Report , vol.M74-244
    • Bell, D.E.1    La Padula, L.J.2
  • 11
    • 0037209771 scopus 로고    scopus 로고
    • Discrete time generative-reactive probabilistic processes with different advancing speeds
    • M. Bravetti and A. Aldini, Discrete time generative-reactive probabilistic processes with different advancing speeds, Theoretical Computer Science 290(1) (2003), 355-406.
    • (2003) Theoretical Computer Science , vol.290 , Issue.1 , pp. 355-406
    • Bravetti, M.1    Aldini, A.2
  • 16
    • 0034500567 scopus 로고    scopus 로고
    • Random oracles in constantipole: Practical asynchronous Byzantine agreement using cryptography (extended abstract)
    • ACM Press
    • C. Cachin, K. Kursawe and V. Shoup, Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract), in: Proc. of 19th Symposium on Principles of Distributed Computing, ACM Press, 2000, pp. 123-132.
    • (2000) Proc. of 19th Symposium on Principles of Distributed Computing , pp. 123-132
    • Cachin, C.1    Kursawe, K.2    Shoup, V.3
  • 21
  • 22
    • 0039926997 scopus 로고    scopus 로고
    • A compiler for analysing cryptographic protocols using non-interference
    • special issue on Software Engineering & Security
    • A. Durante, R. Focardi and R. Gorrieri, A compiler for analysing cryptographic protocols using non-interference, ACM Transactions on Software Engineering and Methodology, special issue on Software Engineering & Security 9(4) (2000), 489-530.
    • (2000) ACM Transactions on Software Engineering and Methodology , vol.9 , Issue.4 , pp. 489-530
    • Durante, A.1    Focardi, R.2    Gorrieri, R.3
  • 23
    • 84944070422 scopus 로고    scopus 로고
    • Analysing time dependent security properties in CSP using PVS
    • Springer LNCS
    • N. Evans and S. Schneider, Analysing time dependent security properties in CSP using PVS, in: Proc. of Symposium on Research in Computer Security, Springer LNCS, Vol. 1895, 2000, pp. 222-237.
    • (2000) Proc. of Symposium on Research in Computer Security , vol.1895 , pp. 222-237
    • Evans, N.1    Schneider, S.2
  • 24
  • 25
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • R. Focardi and R. Gorrieri, The compositional security checker: a tool for the verification of information flow security properties, IEEE Trans. Sof. Eng. 27 (1997), 550-571.
    • (1997) IEEE Trans. Sof. Eng. , vol.27 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 26
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (Part I: Information flow)
    • R. Focardi and R. Gorrieri, eds, Springer LNCS
    • R. Focardi and R. Gorrieri, Classification of security properties (Part I: information flow), in: Foundations of Security Analysis and Design - Tutorial Lectures, R. Focardi and R. Gorrieri, eds, Springer LNCS, Vol. 2171, 2001, pp. 331-396.
    • (2001) Foundations of Security Analysis and Design - Tutorial Lectures , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 31
    • 0006419926 scopus 로고
    • Reactive, generative and stratified models of probabilistic processes
    • R.J. van Glabbeek, S.A. Smolka and B. Steffen, Reactive, generative and stratified models of probabilistic processes, Information and Computation 121 (1995), 59-80.
    • (1995) Information and Computation , vol.121 , pp. 59-80
    • Van Glabbeek, R.J.1    Smolka, S.A.2    Steffen, B.3
  • 33
    • 84974759639 scopus 로고
    • Toward a mathematical foundation for information flow security
    • J.W. Gray, III, Toward a mathematical foundation for information flow security, Journal of Computer Security 1 (1992), 255-294.
    • (1992) Journal of Computer Security , vol.1 , pp. 255-294
    • Gray III, J.W.1
  • 38
    • 84885216103 scopus 로고    scopus 로고
    • Secure information flow for concurrent processes
    • Springer LNCS
    • J. Jürjens, Secure information flow for concurrent processes, in: Proc. of 11th Int. Conf. on Concurrency Theory, Springer LNCS, Vol. 1877, 2000, pp. 395-409.
    • (2000) Proc. of 11th Int. Conf. on Concurrency Theory , vol.1877 , pp. 395-409
    • Jürjens, J.1
  • 52
    • 84957869855 scopus 로고    scopus 로고
    • A Per model of secure information flow in sequential programs
    • Springer LNCS
    • A. Sabelfeld and D. Sands, A Per model of secure information flow in sequential programs, in: Proc. of 8th European Symposium on Programming, Springer LNCS, Vol. 1576, 1999, pp. 40-58.
    • (1999) Proc. of 8th European Symposium on Programming , vol.1576 , pp. 40-58
    • Sabelfeld, A.1    Sands, D.2
  • 59
    • 0029504906 scopus 로고
    • The epistemic representation of information flow security in probabilistic systems
    • IEEE CS Press
    • P. Syverson and J.W. Gray, III, The epistemic representation of information flow security in probabilistic systems, in: Proc. of 8th Computer Security Foundations Workshop, IEEE CS Press, 1995, pp. 152-166.
    • (1995) Proc. of 8th Computer Security Foundations Workshop , pp. 152-166
    • Syverson, P.1    Gray III, J.W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.