메뉴 건너뛰기




Volumn 3193, Issue , 2004, Pages 209-224

Possibilistic information flow control in the presence of encrypted communication

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTERS;

EID: 31844443143     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30108-0_13     Document Type: Article
Times cited : (5)

References (16)
  • 4
    • 35248840989 scopus 로고    scopus 로고
    • Handling encryption in an analysis for secure information flow
    • Proceedings of the 12th European Symposium on Programming, Springer
    • P. Laud. Handling encryption in an analysis for secure information flow. In Proceedings of the 12th European Symposium on Programming, volume 2618 of LNCS. Springer, 2003.
    • (2003) LNCS , vol.2618
    • Laud, P.1
  • 7
    • 84974747891 scopus 로고
    • Proving noninterference and functional correctness using traces
    • J. D. McLean. Proving noninterference and functional correctness using traces. Journal of Computer Security, 1(1):37-57, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 37-57
    • McLean, J.D.1
  • 8
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.