메뉴 건너뛰기




Volumn 14, Issue 1, 2006, Pages 65-110

Information flow security in dynamic contexts

Author keywords

Bisimulation; Information flow; Mobility; Non Interference; Process calculi

Indexed keywords

COMPUTER SIMULATION; INFORMATION ANALYSIS; MATHEMATICAL MODELS; SOFTWARE AGENTS;

EID: 31744437624     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2006-14103     Document Type: Article
Times cited : (23)

References (57)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi, Secrecy by typing in security protocols, Journal of the ACM 46(5) (1999), 749-786.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 3042529082 scopus 로고    scopus 로고
    • A process-algebraic approach for the analysis of probabilistic non-interference
    • A. Aldini, M. Bravetti and R. Gorrieri, A process-algebraic approach for the analysis of probabilistic non-interference, Journal of Computer Security 12(2) (2004), 191-245.
    • (2004) Journal of Computer Security , vol.12 , Issue.2 , pp. 191-245
    • Aldini, A.1    Bravetti, M.2    Gorrieri, R.3
  • 3
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • MITRE MTR-2997
    • D.E. Bell and L.J. La Padula, Secure computer systems: Unified exposition and multics interpretation, Technical Report ESD-TR-75-306, MITRE MTR-2997, 1976.
    • (1976) Technical Report , vol.ESD-TR-75-306
    • Bell, D.E.1    La Padula, L.J.2
  • 4
    • 0347586993 scopus 로고    scopus 로고
    • Information flow security for XML transformations
    • Proc. of Asian Computing Science Conference (ASIAN '03), Springer, Berlin
    • V. Benzaken, M. Burelle and G. Castagna, Information flow security for XML transformations, in: Proc. of Asian Computing Science Conference (ASIAN '03), Volume 2896 of LNCS, Springer, Berlin, 2003, pp. 33-53.
    • (2003) LNCS , vol.2896 , pp. 33-53
    • Benzaken, V.1    Burelle, M.2    Castagna, G.3
  • 5
    • 84937553676 scopus 로고    scopus 로고
    • Static analysis for secrecy and non-interference in networks of processes
    • Proc. of International Conference on Parallel Computing Technologies, V.E. Malyshkin, ed., Springer, Berlin
    • C. Bodei, P. Degano, F. Nielson and H. Riis Nielson, Static analysis for secrecy and non-interference in networks of processes, in: Proc. of International Conference on Parallel Computing Technologies, V.E. Malyshkin, ed., Volume 2127 of LNCS, Springer, Berlin, 2001, pp. 27-41.
    • (2001) LNCS , vol.2127 , pp. 27-41
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Riis Nielson, H.4
  • 7
    • 85029439013 scopus 로고
    • Symbolic bisimulation minimization
    • Proc. of International Conference on Computer Aided Verification (CAV '92), G. von Bochmann and D.K. Probst, eds, Springer, Berlin
    • A. Bouali and R. de Simone, Symbolic bisimulation minimization, in: Proc. of International Conference on Computer Aided Verification (CAV '92), G. von Bochmann and D.K. Probst, eds, Volume 663 of LNCS, Springer, Berlin, 1992, pp. 96-108.
    • (1992) LNCS , vol.663 , pp. 96-108
    • Bouali, A.1    De Simone, R.2
  • 9
    • 84978997669 scopus 로고    scopus 로고
    • Boxed ambients
    • TACS '01 Proc. of the 4th Int. Conference on Theoretical Aspects of Computer Science, Springer, Berlin
    • M. Bugliesi, G. Castagna and S. Crafa, Boxed ambients, in: TACS '01 Proc. of the 4th Int. Conference on Theoretical Aspects of Computer Science, Number 2215 in LNCS, Springer, Berlin, 2001, pp. 38-63.
    • (2001) LNCS , vol.2215 , pp. 38-63
    • Bugliesi, M.1    Castagna, G.2    Crafa, S.3
  • 10
    • 84877738879 scopus 로고    scopus 로고
    • Communication interference in mobile boxed ambients
    • Proc. of Int. Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS '02), M. Agrawal and A. Seth, eds, Springer, Berlin
    • M. Bugliesi, S. Crafa, M. Merro and V. Sassone, Communication interference in mobile boxed ambients, in: Proc. of Int. Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS '02), M. Agrawal and A. Seth, eds, Volume 2556 of LNCS, Springer, Berlin, 2002, pp. 71-84.
    • (2002) LNCS , vol.2556 , pp. 71-84
    • Bugliesi, M.1    Crafa, S.2    Merro, M.3    Sassone, V.4
  • 11
    • 84947919695 scopus 로고    scopus 로고
    • Mobile ambients
    • Proc. of Foundations of Software Science and Computation Structures (FoSSaCS), M. Nivat, ed., Springer
    • L. Cardelli and A.D. Gordon, Mobile ambients, in: Proc. of Foundations of Software Science and Computation Structures (FoSSaCS), M. Nivat, ed., Volume 1378 of LNCS, Springer, 1998, pp. 140-155.
    • (1998) LNCS , vol.1378 , pp. 140-155
    • Cardelli, L.1    Gordon, A.D.2
  • 12
    • 12444299406 scopus 로고    scopus 로고
    • Information flow security for boxed ambients
    • F-WAN: Int. Workshop on Foundations of Wide Area Networks, Elsevier
    • S. Crafa, M. Bugliesi and G. Castagna, Information flow security for boxed ambients, in: F-WAN: Int. Workshop on Foundations of Wide Area Networks, Number 66(3), Electronic Notes in Theoretical Computer Science, Elsevier, 2002.
    • (2002) Electronic Notes in Theoretical Computer Science , vol.66 , Issue.3
    • Crafa, S.1    Bugliesi, M.2    Castagna, G.3
  • 14
    • 84958780189 scopus 로고    scopus 로고
    • A fast bisimulation algorithm
    • Proc. of International Conference on Computer Aided Verification (CAV '01), G. Berry, H. Comon and A. Finkel, eds, Springer, Berlin
    • A. Dovier, C. Piazza and A. Policriti, A fast bisimulation algorithm, in: Proc. of International Conference on Computer Aided Verification (CAV '01), G. Berry, H. Comon and A. Finkel, eds, Volume 2102 of LNCS, Springer, Berlin, 2001, pp. 79-90.
    • (2001) LNCS , vol.2102 , pp. 79-90
    • Dovier, A.1    Piazza, C.2    Policriti, A.3
  • 15
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • R. Focardi and R. Gorrieri, A classification of security properties for process algebras, Journal of Computer Security 3(1) (1994/1995), 5-33.
    • (1994) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 16
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • R. Focardi and R. Gorrieri, The compositional security checker: A tool for the verification of information flow security properties, IEEE Transactions on Software Engineering 23(9) (1997), 550-571.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 17
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (Part I: Information flow)
    • Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri, eds, Springer, Berlin
    • R. Focardi and R. Gorrieri, Classification of security properties (Part I: Information flow), in: Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri, eds, Volume 2171 of LNCS, Springer, Berlin, 2001.
    • (2001) LNCS , vol.2171
    • Focardi, R.1    Gorrieri, R.2
  • 18
    • 84974597207 scopus 로고    scopus 로고
    • Non Interference for the analysis of cryptographic protocols
    • U. Montanari, J.D.P. Rolim and E. Welzl, eds, Proc. of International Colloquium on Automata, Languages and Programming (ICALP '00), Springer, Berlin
    • R. Focardi, R. Gorrieri and F. Martinelli, Non Interference for the analysis of cryptographic protocols, in: U. Montanari, J.D.P. Rolim and E. Welzl, eds, Proc. of International Colloquium on Automata, Languages and Programming (ICALP '00), Volume 1853 of LNCS, Springer, Berlin, 2000, pp. 744-755.
    • (2000) LNCS , vol.1853 , pp. 744-755
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 23
    • 35248873844 scopus 로고    scopus 로고
    • A simple language for real-time cryptographic protocol analysis
    • Proc. of European Symposium on Programming (ESOP '03), P. Degano, ed., Springer, Berlin
    • R. Gorrieri, E. Locatelli and F. Martinelli, A simple language for real-time cryptographic protocol analysis, in: Proc. of European Symposium on Programming (ESOP '03), P. Degano, ed., Volume 2618 of LNCS, Springer, Berlin, 2003, pp. 114-128.
    • (2003) LNCS , vol.2618 , pp. 114-128
    • Gorrieri, R.1    Locatelli, E.2    Martinelli, F.3
  • 24
    • 20144362494 scopus 로고    scopus 로고
    • The security picalculus and Non-interference
    • University of Sussex, School of Cognitive and Computing Sciences, Brighton BN1 9QH, UK, Nov.
    • M. Hennessy, The security picalculus and Non-interference, Technical Report CS-05-2000, University of Sussex, School of Cognitive and Computing Sciences, Brighton BN1 9QH, UK, Nov. 2000.
    • (2000) Technical Report , vol.CS-05-2000
    • Hennessy, M.1
  • 26
    • 0037170503 scopus 로고    scopus 로고
    • Resource access control in systems of mobile agents
    • M. Hennessy and J. Riely, Resource access control in systems of mobile agents, Information and Computation 173 (2002), 82-120.
    • (2002) Information and Computation , vol.173 , pp. 82-120
    • Hennessy, M.1    Riely, J.2
  • 28
    • 0025432462 scopus 로고
    • CCS Expressions, Finite state processes, and three problems of equivalence
    • P.C. Kannellakis and S.A. Smolka, CCS Expressions, Finite state processes, and three problems of equivalence, Information and Computation 86(1) (1990), 43-68.
    • (1990) Information and Computation , vol.86 , Issue.1 , pp. 43-68
    • Kannellakis, P.C.1    Smolka, S.A.2
  • 32
    • 84944059120 scopus 로고    scopus 로고
    • Unwinding possibilistic security properties
    • Proc. of the European Symposium on Research in Computer Security (ESoRiCS '00), Springer, Berlin
    • H. Mantel, Unwinding possibilistic security properties, in: Proc. of the European Symposium on Research in Computer Security (ESoRiCS '00), Volume 2895 of LNCS, Springer, Berlin, 2000, pp. 238-254.
    • (2000) LNCS , vol.2895 , pp. 238-254
    • Mantel, H.1
  • 33
    • 0023231848 scopus 로고
    • Specifications for multi-level security and a hook-up property
    • IEEE Computer Society Press
    • D. McCullough, Specifications for multi-level security and a hook-up property, in: Proc, of the IEEE Symposium on Security and Privacy (SSP '87), IEEE Computer Society Press, 1987, pp. 161-166.
    • (1987) Proc, of the IEEE Symposium on Security and Privacy (SSP '87) , pp. 161-166
    • McCullough, D.1
  • 34
    • 0023829319 scopus 로고
    • Noninterference and the composability of security properties
    • IEEE Computer Society Press
    • D. McCullough, Noninterference and the composability of security properties, in: Proceedings, 1988 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1988, pp. 177-186.
    • (1988) Proceedings, 1988 IEEE Symposium on Security and Privacy , pp. 177-186
    • McCullough, D.1
  • 36
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • IEEE Computer Society Press
    • J. McLean, A general theory of composition for trace sets closed under selective interleaving functions, in: Proc. of the IEEE Symposium on Security and Privacy (SSP '94), IEEE Computer Society Press, 1994, pp. 79-93.
    • (1994) Proc. of the IEEE Symposium on Security and Privacy (SSP '94) , pp. 79-93
    • McLean, J.1
  • 37
    • 0024925378 scopus 로고
    • Finite-state noiseless covert channels
    • MITRE Corporation, IEEE Computer Society Press
    • J.K. Millen, Finite-state noiseless covert channels, in: Proceedings of the Computer Security Foundations Workshop II, MITRE Corporation, IEEE Computer Society Press, 1989, pp. 81-86.
    • (1989) Proceedings of the Computer Security Foundations Workshop , vol.2 , pp. 81-86
    • Millen, J.K.1
  • 40
    • 84969347374 scopus 로고
    • CCS dynamic bisimulation is progressing
    • Proc. of the Int. Symposium on Mathematical Foundations of Computer Science (MFCS '91), Springer, Berlin
    • U. Montanari and V. Sassone, CCS dynamic bisimulation is progressing, in: Proc. of the Int. Symposium on Mathematical Foundations of Computer Science (MFCS '91), Volume 520 of LNCS, Springer, Berlin, 1991, pp. 346-356.
    • (1991) LNCS , vol.520 , pp. 346-356
    • Montanari, U.1    Sassone, V.2
  • 43
    • 0023566630 scopus 로고
    • Three partition refinement algorithms
    • R. Paige and R.E. Tarjan, Three partition refinement algorithms, SIAM Journal on Computing 16(6) (1987), 973-989.
    • (1987) SIAM Journal on Computing , vol.16 , Issue.6 , pp. 973-989
    • Paige, R.1    Tarjan, R.E.2
  • 44
    • 24644460616 scopus 로고    scopus 로고
    • CoPS: Checker of persistent security
    • Proc. of Int. Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS '04), Springer, Berlin
    • C. Piazza, E. Pivato and S. Rossi, CoPS: Checker of persistent security, in: Proc. of Int. Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS '04), Volume 2988 of LNCS, Springer, Berlin, 2004, pp. 144-152.
    • (2004) LNCS , vol.2988 , pp. 144-152
    • Piazza, C.1    Pivato, E.2    Rossi, S.3
  • 45
    • 84948737028 scopus 로고    scopus 로고
    • A simple view of type-secure information flow in the iπ-calculus
    • IEEE Computer Society Press
    • F. Pottier, A simple view of type-secure information flow in the iπ-calculus, in: Proc. of the 15th IEEE Computer Secuiity Foundations Workshop (CSFW15), IEEE Computer Society Press, 2002, pp. 320-330.
    • (2002) Proc. of the 15th IEEE Computer Secuiity Foundations Workshop (CSFW15) , pp. 320-330
    • Pottier, F.1
  • 47
    • 0035067847 scopus 로고    scopus 로고
    • Process algebra and Non-interference
    • P. Ryan and S. Schneider, Process algebra and Non-interference, Journal of Computer Security 9(1/2) (2001), 75-103.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 75-103
    • Ryan, P.1    Schneider, S.2
  • 48
    • 0003142759 scopus 로고
    • A CSP formulation of Non-interference and unwinding
    • P.Y.A. Ryan, A CSP formulation of Non-interference and unwinding, Cipher (1991), 19-27.
    • (1991) Cipher , pp. 19-27
    • Ryan, P.Y.A.1
  • 49
    • 0033700286 scopus 로고    scopus 로고
    • Probabilistic Noninterference for multi-threaded programs
    • IEEE Computer Society Press
    • A. Sabelfed and D. Sands, Probabilistic Noninterference for multi-threaded programs, in: Proc. of the IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2000, pp. 200-215.
    • (2000) Proc. of the IEEE Computer Security Foundations Workshop , pp. 200-215
    • Sabelfed, A.1    Sands, D.2
  • 52
    • 0001422438 scopus 로고
    • Characteristic formulae for processes with divergence
    • B. Steffen and A. Ingòlfsdòttir, Characteristic formulae for processes with divergence, Information and Computation 110(1) (1994) 149-163.
    • (1994) Information and Computation , vol.110 , Issue.1 , pp. 149-163
    • Steffen, B.1    Ingòlfsdòttir, A.2
  • 53
    • 84947744871 scopus 로고    scopus 로고
    • Modal and temporal logics for processes
    • Logics for Concurrency: Structures versus Automata, E. Brinksma, R. Cleaveland, K.G.T. Margaria Larsen and B. Steffen, eds, Springer, Berlin
    • C. Stirling, Modal and temporal logics for processes, in: Logics for Concurrency: Structures versus Automata, E. Brinksma, R. Cleaveland, K.G.T. Margaria Larsen and B. Steffen, eds, Volume 1043 of LNCS, Springer, Berlin, 1996, pp. 149-237.
    • (1996) LNCS , vol.1043 , pp. 149-237
    • Stirling, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.