메뉴 건너뛰기




Volumn 96, Issue , 2002, Pages 383-395

Boundary inference for enforcing security policies in mobile ambients

Author keywords

Mobile ambients; Security; Static analysis

Indexed keywords

CALCULATIONS; COMPUTER HARDWARE DESCRIPTION LANGUAGES; SECURITY SYSTEMS;

EID: 3242737926     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-35608-2_32     Document Type: Article
Times cited : (9)

References (13)
  • 1
    • 0003969635 scopus 로고
    • DOD Trusted Computer System Evaluation Criteria
    • US Department of Defense
    • US Department of Defense. DOD Trusted Computer System Evaluation Criteria. DOD 5200.28-STD, 1985.
    • (1985) DOD 5200.28-STD
  • 6
    • 0011837296 scopus 로고    scopus 로고
    • Information Flow Security in Mobile Ambients
    • Lipari Island, July, volume 54 of Electronic Notes in Theoretical Computer Science, Elsevier
    • A. Cortesi, and R. Focardi. Information Flow Security in Mobile Ambients. In Proc. of International Workshop on Cuncurrency and Coordination CONCOORD'01, Lipari Island, July 2001, volume 54 of Electronic Notes in Theoretical Computer Science, Elsevier, 2001.
    • (2001) Proc. of International Workshop On Cuncurrency and Coordination CONCOORD'01
    • Cortesi, A.1    Focardi, R.2
  • 7
    • 84957807650 scopus 로고    scopus 로고
    • Safe Ambients: Control Flow Analysis and Security
    • P. Degano, F. Levi, C. Bodei. Safe Ambients: Control Flow Analysis and Security. In Proceedings of ASIAN'00, LNCS 1961,2000, pages 199-214.
    • (2000) Proceedings Of ASIAN'00, LNCS , vol.1961 , pp. 199-214
    • Degano, P.1    Levi, F.2    Bodei, C.3
  • 8
    • 84974776068 scopus 로고
    • A Classification of Security Properties for Process Algebras
    • R. Focardi and R. Gorrieri. A Classification of Security Properties for Process Algebras. Journal of Computer Security, 3(1): 5-33,1995.
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 9
    • 0001439194 scopus 로고    scopus 로고
    • The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
    • R. Focardi and R. Gorrieri. The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties, IEEE Transactions on Software Engineering, Vol. 23, No. 9, September 1997.
    • (1997) IEEE Transactions On Software Engineering , vol.9 , pp. 23
    • Focardi, R.1    Gorrieri, R.2
  • 12
    • 84974577536 scopus 로고    scopus 로고
    • Information Flow vs. Resource Access in the Asynchronous Pi-Calculus
    • M. Hennessy, J. Riely. Information Flow vs. Resource Access in the Asynchronous Pi-Calculus. ICALP 2000:415-427.
    • ICALP , vol.2000 , pp. 415-427
    • Hennessy, M.1    Riely, J.2
  • 13
    • 0031648455 scopus 로고    scopus 로고
    • Secure Information Flow in a Multi-Threaded Imperative Language
    • G. Smith, D.M. Volpano, Secure Information Flow in a Multi-Threaded Imperative Language. In Proc. of POPL 1998: 355-364.
    • (1998) Proc. of POPL , pp. 355-364
    • Smith, G.1    Volpano, D.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.