메뉴 건너뛰기




Volumn , Issue , 2005, Pages 43-52

Formal security analysis of basic network-attached storage

Author keywords

Applied pi calculus; Full abstraction; Secure storage

Indexed keywords

APPLIED PI CALCULUS; FULL ABSTRACTION; SECURE STORAGE;

EID: 31844452409     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1103576.1103583     Document Type: Conference Paper
Times cited : (8)

References (21)
  • 2
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 5
    • 0037052276 scopus 로고    scopus 로고
    • Secure implementation of channel abstractions
    • Apr.
    • M. Abadi, C. Fournet, and G. Gonthier. Secure implementation of channel abstractions. Information and Computation, 174(1):37-83, Apr. 2002.
    • (2002) Information and Computation , vol.174 , Issue.1 , pp. 37-83
    • Abadi, M.1    Fournet, C.2    Gonthier, G.3
  • 6
    • 0003761061 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Digital Systems Research Center, Palo Alto CA, January
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Technical Report SRC-RR-149, Digital Systems Research Center, Palo Alto CA, January 1998.
    • (1998) Technical Report , vol.SRC-RR-149
    • Abadi, M.1    Gordon, A.D.2
  • 7
    • 3543058869 scopus 로고    scopus 로고
    • Automatic proof of strong secrecy for security protocols
    • May
    • B. Blanchet, Automatic Proof of Strong Secrecy for Security Protocols. In IEEE Symposium on Security and Privacy, pages 86-100, May 2004.
    • (2004) IEEE Symposium on Security and Privacy , pp. 86-100
    • Blanchet, B.1
  • 8
    • 0004215976 scopus 로고
    • A logic of authentication
    • A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, February 1989
    • M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Proceedings of the Royal Society of London A, 426:233-271, 1989. A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, February 1989.
    • (1989) Proceedings of the Royal Society of London A , vol.426 , pp. 233-271
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 11
    • 4244158697 scopus 로고    scopus 로고
    • Security for network attached storage devices
    • Carnegie Mellon University, October
    • H. Gobioff, G. Gibson, and J. Tygar. Security for network attached storage devices. Technical Report CMU-CS-97-185, Carnegie Mellon University, October 1997.
    • (1997) Technical Report , vol.CMU-CS-97-185
    • Gobioff, H.1    Gibson, G.2    Tygar, J.3
  • 12
    • 0038414953 scopus 로고    scopus 로고
    • Typing correspondence assertions for communication protocols
    • A. D. Gordon and A. Jeffrey. Typing correspondence assertions for communication protocols. Theoretical Computer Science, 300(1-3):379-409, 2003.
    • (2003) Theoretical Computer Science , vol.300 , Issue.1-3 , pp. 379-409
    • Gordon, A.D.1    Jeffrey, A.2
  • 13
    • 84858537057 scopus 로고    scopus 로고
    • Untrustworthy programming languages
    • Talk May
    • A. Kennedy, Untrustworthy programming languages. Talk at the Joint Queen Mary/Imperial College Seminar series, May 2005. Slides available at http://research.microsoft.com/~akenn/sec/index.html.
    • (2005) Joint Queen Mary/Imperial College Seminar Series
    • Kennedy, A.1
  • 17
    • 0001862336 scopus 로고
    • Fully abstract models of typed lambda-calculi
    • R. Milner. Fully abstract models of typed lambda-calculi. Theoretical Computer Science, 4(1):1-22, 1977.
    • (1977) Theoretical Computer Science , vol.4 , Issue.1 , pp. 1-22
    • Milner, R.1
  • 18
    • 0000511698 scopus 로고
    • The polyadic pi-calculus: A tutorial
    • F. L. Bauer, W. Brauer, and H. Schwichtenberg, editors, Springer-Verlag
    • R. Milner. The polyadic pi-calculus: a tutorial. In F. L. Bauer, W. Brauer, and H. Schwichtenberg, editors, Logic and Algebra of Specification, pages 203-246. Springer-Verlag, 1993.
    • (1993) Logic and Algebra of Specification , pp. 203-246
    • Milner, R.1
  • 20
    • 0033906295 scopus 로고    scopus 로고
    • Authenticating network-attached storage
    • Jan.
    • B. C. Reed, E. G. Chron, R. C. Burns, and D. D. E. Long. Authenticating network-attached storage. IEEE Micro, 20(1):49-57, Jan. 2000.
    • (2000) IEEE Micro , vol.20 , Issue.1 , pp. 49-57
    • Reed, B.C.1    Chron, E.G.2    Burns, R.C.3    Long, D.D.E.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.