메뉴 건너뛰기




Volumn , Issue , 2005, Pages 53-62

The framework of selective interleaving functions and the modular assembly kit

Author keywords

Formal specification and analysis of security properties; Information flow security; Noninterference

Indexed keywords

FORMAL LOGIC; SECURITY OF DATA;

EID: 31844452867     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1103576.1103584     Document Type: Conference Paper
Times cited : (8)

References (33)
  • 3
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • FOCARDI, R., AND GORRIERI, R. A Classification of Security Properties for Process Algebras. Journal of Computer Security 3, 1 (1995), 5-33.
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 4
    • 84958046259 scopus 로고    scopus 로고
    • A uniform approach to the definition of security properties
    • Proceedings of FM'99 Formal Methods (vol. 1)
    • FOCARDI, R., AND MARTINELLI, F. A Uniform Approach to the Definition of Security Properties. In Proceedings of FM'99 Formal Methods (vol. 1) (1999), vol. 1708 of LNCS, pp. 794-813.
    • (1999) LNCS , vol.1708 , pp. 794-813
    • Focardi, R.1    Martinelli, F.2
  • 9
    • 31844443143 scopus 로고    scopus 로고
    • Possibilistic information flow control in the presence of encrypted communication
    • Proceedings of the European Symposium on Research in Computer Security
    • HUTTER, D., AND SCHAIRER, A. Possibilistic Information Flow Control in the Presence of Encrypted Communication. In Proceedings of the European Symposium on Research in Computer Security (2004), vol. 3193 of LNCS, pp. 209-224.
    • (2004) LNCS , vol.3193 , pp. 209-224
    • Hutter, D.1    Schairer, A.2
  • 12
    • 84944059120 scopus 로고    scopus 로고
    • Unwinding possibilistic security properties
    • Proceedings of the European Symposium on Research in Computer Security
    • MANTEL, H. Unwinding Possibilistic Security Properties. In Proceedings of the European Symposium on Research in Computer Security (2000), vol. 1895 of LNCS, pp. 238-254.
    • (2000) LNCS , vol.1895 , pp. 238-254
    • Mantel, H.1
  • 13
    • 84881123660 scopus 로고    scopus 로고
    • Information flow control and applications - Bridging a gap
    • Proceedings of FME S001: Formal Methods for Increasing Software Productivity
    • MANTEL, H. Information Flow Control and Applications - Bridging a Gap. In Proceedings of FME S001: Formal Methods for Increasing Software Productivity (2001), vol. 2021 of LNCS, pp. 153-172.
    • (2001) LNCS , vol.2021 , pp. 153-172
    • Mantel, H.1
  • 17
    • 31844452782 scopus 로고    scopus 로고
    • Using information flow control to evaluate access protection of location information in mobile communication networks
    • Computer Science Department, University of Freiburg
    • MANTEL, H., SCHAIRER, A., KABATNIK, M., KREUTZER, M., AND ZUGENMAIER, A. Using Information Flow Control to Evaluate Access Protection of Location Information In Mobile Communication Networks. Tech. Rep. 159, Computer Science Department, University of Freiburg, 2001.
    • (2001) Tech. Rep. , vol.159
    • Mantel, H.1    Schairer, A.2    Kabatnik, M.3    Kreutzer, M.4    Zugenmaier, A.5
  • 20
    • 0002426876 scopus 로고    scopus 로고
    • A general theory of composition for a class of "possibilistlc" security properties
    • MCLEAN, J. D. A General Theory of Composition for a Class of "Possibilistlc" Security Properties. IEEE Transaction on Software Engineering 22, 1 (1996), 53-67.
    • (1996) IEEE Transaction on Software Engineering , vol.22 , Issue.1 , pp. 53-67
    • Mclean, J.D.1
  • 21
    • 0003954103 scopus 로고
    • International Series in Computer Science. Prentice Hall
    • MILNER, R. Communication and Concurrency. International Series in Computer Science. Prentice Hall, 1989.
    • (1989) Communication and Concurrency
    • Milner, R.1
  • 26
    • 0001868056 scopus 로고
    • Non-interference through determinism
    • Proceedings of the European Symposium on Research in Computer Security
    • ROSCOE, A. W., WOODCOCK, J. C. P., AND WULF, L. Non-Interference through Determinism. In Proceedings of the European Symposium on Research in Computer Security (1994), vol. 875 of LNCS, pp. 33-53.
    • (1994) LNCS , vol.875 , pp. 33-53
    • Roscoe, A.W.1    Woodcock, J.C.P.2    Wulf, L.3
  • 29
    • 31844435915 scopus 로고    scopus 로고
    • Information flow control for multiagent systems
    • Master's thesis, Universität Rostock
    • SCHÄFER, I. Information Flow Control for Multiagent Systems, A Case Study in Comparison Shopping. Master's thesis, Universität Rostock, 2004.
    • (2004) A Case Study in Comparison Shopping
    • Schäfer, I.1
  • 30
    • 35048854255 scopus 로고    scopus 로고
    • Information flow control revisited: Noninfluence = noninterference + nonleakage
    • Proceedings of the European Symposium on Research in Computer Security
    • v. OHEIMB, D. Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage. In Proceedings of the European Symposium on Research in Computer Security (2004), vol. 3193 of LNCS, pp. 225-243.
    • (2004) LNCS , vol.3193 , pp. 225-243
    • Oheimb, D.V.1
  • 32
    • 18944393517 scopus 로고    scopus 로고
    • PhD thesis, Graduate Department of Electrical and Computer Engineering, University of Toronto
    • ZAKINTHINOS, A. On the Composition of Security Properties. PhD thesis, Graduate Department of Electrical and Computer Engineering, University of Toronto, 1996.
    • (1996) On the Composition of Security Properties
    • Zakinthinos, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.