메뉴 건너뛰기




Volumn 3679 LNCS, Issue , 2005, Pages 336-354

Quantifying probabilistic information flow in computational reactive systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL PROBABILISTIC; COMPUTATIONAL RESTRICTIONS; CRYPTOGRAPHIC SYSTEMS; ERROR PROBABILITIES;

EID: 33646022579     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11555827_20     Document Type: Conference Paper
Times cited : (15)

References (40)
  • 1
    • 84957037045 scopus 로고    scopus 로고
    • Computational probabilistic non-interference
    • Proc. 7th European Symposium on Research in Computer Security (ESORICS), Springer
    • M. Backes and B. Pfitzmann. Computational probabilistic non-interference. In Proc. 7th European Symposium on Research in Computer Security (ESORICS), volume 2502 of Lecture Notes in Computer Science, pages 1-23. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2502 , pp. 1-23
    • Backes, M.1    Pfitzmann, B.2
  • 4
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • The Mitre Corporation
    • D. Bell and L. LaPadula. Secure computer systems: Unified exposition and multics interpretation. Computer Science Technical Report ESD-TR-75-306, The Mitre Corporation, 1976.
    • (1976) Computer Science Technical Report , vol.ESD-TR-75-306
    • Bell, D.1    LaPadula, L.2
  • 5
    • 0345275464 scopus 로고    scopus 로고
    • Quantitative analysis of the leakage of confidential data
    • Proc. Quantitative Aspects of Programming Languages, Elsevier
    • D. Clark, S. Hunt, and P. Malacaria. Quantitative analysis of the leakage of confidential data. In Proc. Quantitative Aspects of Programming Languages, volume 59 of Electronic Notes in Theoretical Computer Science. Elsevier, 2002.
    • (2002) Electronic Notes in Theoretical Computer Science , vol.59
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 7
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 9
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • R. Focardi and R. Gorrieri. The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23(9):550-571, 1997.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 10
    • 84958046259 scopus 로고    scopus 로고
    • A uniform approach to the definition of security properties
    • Proc. 8th Symposium on Formal Methods Europe (FME 1999), Springer
    • R. Focardi and F. Martinelli. A uniform approach to the definition of security properties. In Proc. 8th Symposium on Formal Methods Europe (FME 1999), volume 1708 of Lecture Notes in Computer Science, pages 794-813. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1708 , pp. 794-813
    • Focardi, R.1    Martinelli, F.2
  • 14
    • 84974759639 scopus 로고
    • Toward a mathematical foundation for information flow security
    • J. W. Gray III. Toward a mathematical foundation for information flow security. Journal of Computer Security, 1(3):255-295, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.3 , pp. 255-295
    • Gray III, J.W.1
  • 15
    • 0003843704 scopus 로고
    • International Series in Computer Science, Prentice Hall, Hemel Hempstead
    • C. A. R. Hoare. Communicating Sequential Processes. International Series in Computer Science, Prentice Hall, Hemel Hempstead, 1985.
    • (1985) Communicating Sequential Processes
    • Hoare, C.A.R.1
  • 17
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B. W. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, 1973.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 18
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. 10th European Symposium on Programming (ESOP), pages 77-91, 2001.
    • (2001) Proc. 10th European Symposium on Programming (ESOP) , pp. 77-91
    • Laud, P.1
  • 19
    • 3543052976 scopus 로고    scopus 로고
    • Symmetric encryption in automatic analyses for confidentiality against active adversaries
    • P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. 25th IEEE Symposium on Security & Privacy, pages 71-85, 2004.
    • (2004) Proc. 25th IEEE Symposium on Security & Privacy , pp. 71-85
    • Laud, P.1
  • 21
    • 0004215089 scopus 로고    scopus 로고
    • Morgan Kaufmann Publishers, San Francisco
    • N. Lynch. Distributed Algorithms. Morgan Kaufmann Publishers, San Francisco, 1996.
    • (1996) Distributed Algorithms
    • Lynch, N.1
  • 22
    • 84944059120 scopus 로고    scopus 로고
    • Unwinding possibilistic security properties
    • Proc. 6th European Symposium on Research in Computer Security (ESORICS), Springer
    • H. Mantel. Unwinding possibilistic security properties. In Proc. 6th European Symposium on Research in Computer Security (ESORICS), volume 1895 of Lecture Notes in Computer Science, pages 238-254. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1895 , pp. 238-254
    • Mantel, H.1
  • 24
    • 0023231848 scopus 로고
    • Specifications for multi-level security and a hook-up property
    • D. McCullough. Specifications for multi-level security and a hook-up property. In Proc. 8th IEEE Symposium on Security & Privacy, pages 161-166, 1987.
    • (1987) Proc. 8th IEEE Symposium on Security & Privacy , pp. 161-166
    • McCullough, D.1
  • 29
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184-200, 2001.
    • (2001) Proc. 22nd IEEE Symposium on Security & Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2
  • 32
  • 40
    • 84945262623 scopus 로고    scopus 로고
    • Secure information flow and CPS
    • Proc. 10th European Symposium on Programming (ESOP), Springer
    • S. Zdancewic and A. C. Myers. Secure information flow and CPS. In Proc. 10th European Symposium on Programming (ESOP), volume 2028 of Lecture Notes in Computer Science, pages 46-61. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2028 , pp. 46-61
    • Zdancewic, S.1    Myers, A.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.