메뉴 건너뛰기




Volumn 30, Issue 3-4 SPEC. ISS., 2004, Pages 231-258

Verifying persistent security properties

Author keywords

Noninterference; Process algebra; Security; Verification

Indexed keywords

COMPUTER CONTROL; COMPUTER NETWORKS; COMPUTER SIMULATION; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; INFORMATION DISSEMINATION; NETWORK PROTOCOLS; SECURITY OF DATA; SECURITY SYSTEMS; SEMANTICS; UNIX; USER INTERFACES;

EID: 3242706680     PISSN: 14778424     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cl.2004.02.005     Document Type: Conference Paper
Times cited : (34)

References (54)
  • 4
    • 0024925378 scopus 로고
    • Finite-state noiseless covert channels
    • the MITRE Corporation. Silver Spring, MD: IEEE Computer Society Press
    • Millen JK. Finite-state noiseless covert channels., In: Proceedings of the Computer Security Foundations Workshop II, the MITRE Corporation. Silver Spring, MD: IEEE Computer Society Press, 1989. p. 81-6.
    • (1989) Proceedings of the Computer Security Foundations Workshop II , pp. 81-86
    • Millen, J.K.1
  • 8
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • Focardi R., Gorrieri R. A classification of security properties for process algebras. Journal of Computer Security. 3(1):19941995;5-33.
    • (1994) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 10
    • 0033701251 scopus 로고    scopus 로고
    • Possibilistic definitions of security - An assembly kit
    • Silver Spring, MD: IEEE Computer Society Press
    • Mantel H. Possibilistic definitions of security - an assembly kit - In: Proceedings of the IEEE Symposium on Security and Privacy (SSP'00). Silver Spring, MD: IEEE Computer Society Press; 2000. p. 185-99.
    • (2000) Proceedings of the IEEE Symposium on Security and Privacy (SSP'00) , pp. 185-199
    • Mantel, H.1
  • 11
    • 0023231848 scopus 로고
    • Specifications for multi-level security and a hook-up property
    • Silver Spring, MD: IEEE Computer Society Press
    • McCullough D. Specifications for multi-level security and a hook-up property. In: Proceedings of the IEEE Symposium on Security and Privacy (SSP'87). Silver Spring, MD: IEEE Computer Society Press; 1987. p. 161-6.
    • (1987) Proceedings of the IEEE Symposium on Security and Privacy (SSP'87) , pp. 161-166
    • McCullough, D.1
  • 13
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • Silver Spring, MD: IEEE Computer Society Press
    • McLean J. A general theory of composition for trace sets closed under selective interleaving functions. In: Proceedings of the IEEE Symposium on Security and Privacy (SSP'94). Silver Spring, MD: IEEE Computer Society Press; 1994. p. 79-93.
    • (1994) Proceedings of the IEEE Symposium on Security and Privacy (SSP'94) , pp. 79-93
    • McLean, J.1
  • 19
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (part I: Information flow)
    • R. Focardi, & R. Gorrieri. Foundations of Security Analysis and Design, Berlin: Springer
    • Focardi R., Gorrieri R. Classification of security properties (part I: information flow). Focardi R., Gorrieri R. Foundations of Security Analysis and Design, vol. 2171 of Lecture Notes in Computer Science. 2001;331-396 Springer, Berlin.
    • (2001) Lecture Notes in Computer Science , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 20
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • Focardi R., Gorrieri R. The compositional security checker. a tool for the verification of information flow security properties IEEE Transactions on Software Engineering. 23(9):1997;550-571.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 22
    • 0031645024 scopus 로고    scopus 로고
    • Partial model checking and theorem proving for ensuring security properties
    • Silver Spring, MD: IEEE Computer Society Press
    • Martinelli F. Partial model checking and theorem proving for ensuring security properties. In: Proceedings of the IEEE Computer Security Foundations Workshop (CSFW'98). Silver Spring, MD: IEEE Computer Society Press; 1998. p. 44-52.
    • (1998) Proceedings of the IEEE Computer Security Foundations Workshop (CSFW'98) , pp. 44-52
    • Martinelli, F.1
  • 25
    • 84944059120 scopus 로고    scopus 로고
    • Unwinding possibilistic security properties
    • vol. 2895 of Lecture Notes in Computer Science. Berlin: Springer
    • Mantel H. Unwinding possibilistic security properties. In: Proceedings of the European Symposium on Research in Computer Security, vol. 2895 of Lecture Notes in Computer Science. Berlin: Springer; 2000. p. 238-54.
    • (2000) Proceedings of the European Symposium on Research in Computer Security , pp. 238-254
    • Mantel, H.1
  • 28
    • 0001422438 scopus 로고
    • Characteristic formulae for Processes with divergence
    • Steffen B., Ingòlfsdòttir A. Characteristic formulae for Processes with divergence. Information and Computation. 110(1):1994;149-163.
    • (1994) Information and Computation , vol.110 , Issue.1 , pp. 149-163
    • Steffen, B.1    Ingòlfsdòttir, A.2
  • 29
    • 49049126479 scopus 로고
    • Results on the propositional μ -calculus
    • Kozen D. Results on the propositional. μ -calculus Theoretical Computer Science. 27:1983;333-354.
    • (1983) Theoretical Computer Science , vol.27 , pp. 333-354
    • Kozen, D.1
  • 31
    • 0023566630 scopus 로고
    • Three partition refinement algorithms
    • Paige R., Tarjan R.E. Three partition refinement algorithms. SIAM Journal on computing. 16(6):1987;973-989.
    • (1987) SIAM Journal on Computing , vol.16 , Issue.6 , pp. 973-989
    • Paige, R.1    Tarjan, R.E.2
  • 32
  • 35
    • 84863943881 scopus 로고    scopus 로고
    • XEVE, an ESTEREL verification environment
    • A.J. Hu, & M.Y. Vardi, vol. 1427 of Lecture Notes in Computer Science. Berlin: Springer
    • Bouali A. XEVE, an ESTEREL verification environment. Hu A.J., Vardi M.Y. Proceedings of International Conference on Computer Aided Verification (CAV'98), vol. 1427 of Lecture Notes in Computer Science. 1998;500-504 Springer, Berlin.
    • (1998) Proceedings of International Conference on Computer Aided Verification (CAV'98) , pp. 500-504
    • Bouali, A.1
  • 36
    • 0003988659 scopus 로고    scopus 로고
    • The theory and practice of concurrency
    • Englewood Cliffs, NJ: Prentice Hall
    • Roscoe A.W. The theory and practice of concurrency, Series in Computer Science. 1998;Prentice Hall, Englewood Cliffs, NJ.
    • (1998) Series in Computer Science
    • Roscoe, A.W.1
  • 39
    • 0002426876 scopus 로고    scopus 로고
    • A general theory of composition for a class of "possibilistic" security properties
    • McLean J. A general theory of composition for a class of "possibilistic" security properties. IEEE Transactions on Software Engineering. 22(1):1996;53-67.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 53-67
    • McLean, J.1
  • 44
    • 0004235635 scopus 로고
    • PhD thesis, Universiteit van Amsterdam, Instituut voor Logica en Grondslagenonderzoek van Exacte Wetenschappen
    • Benthem Jv. Modal correspondence theory. PhD thesis, Universiteit van Amsterdam, Instituut voor Logica en Grondslagenonderzoek van Exacte Wetenschappen, 1976.
    • (1976) Modal Correspondence Theory
    • Benthem, Jv.1
  • 45
    • 0003253658 scopus 로고
    • Non-well-founded sets
    • Stanford University Press. Stanford, USA: CSLI
    • Aczel P. Non-well-founded sets, vol. 14 of CSLI Lecture Notes, Stanford University Press. Stanford, USA: CSLI; 1988.
    • (1988) CSLI Lecture Notes , vol.14
    • Aczel, P.1
  • 52
    • 0034836335 scopus 로고    scopus 로고
    • Preserving information flow properties under refinement
    • Silver Spring, MD: IEEE Computer Society Press
    • Mantel H. Preserving information flow properties under refinement. In: Proceedings of the IEEE Symposium on Security and Privacy (SSP'01). Silver Spring, MD: IEEE Computer Society Press; 2001. p. 78-91.
    • (2001) Proceedings of the IEEE Symposium on Security and Privacy (SSP'01) , pp. 78-91
    • Mantel, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.