메뉴 건너뛰기




Volumn 14, Issue 2, 2006, Pages 157-196

Enforcing robust declassification and qualified robustness

Author keywords

Computer security; Confidentiality; Declassification; Endorsement; Information flow; Integrity; Noninterference; Security policies; Security type systems

Indexed keywords

COMPUTER PROGRAMMING; CONTROL SYSTEMS; INFORMATION RETRIEVAL; PROGRAM COMPILERS; PUBLIC POLICY; SECURITY OF DATA;

EID: 33646177208     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2006-14203     Document Type: Article
Times cited : (78)

References (54)
  • 5
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • USAF Electronic Systems Division, Bedford, MA, Apr. (Also available through National Technical Information Service, Springfield Va., NTIS AD-A039324.)
    • K.J. Biba, Integrity considerations for secure computer systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, Apr. 1977. (Also available through National Technical Information Service, Springfield Va., NTIS AD-A039324.)
    • (1977) Technical Report ESD-TR-76-372
    • Biba, K.J.1
  • 9
    • 0345275464 scopus 로고    scopus 로고
    • Quantitative analysis of the leakage of confidential data
    • Proc. Quantitative Aspects of Programming Languages, Elsevier
    • D. Clark, S. Hunt and P. Malacaria, Quantitative analysis of the leakage of confidential data, in: Proc. Quantitative Aspects of Programming Languages, Volume 59 of ENTCS, Elsevier, 2002.
    • (2002) ENTCS , vol.59
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 11
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • R.A. DeMillo, D.P. Dobkin, A.K. Jones and R.J. Lipton, eds, Academic Press
    • E.S. Cohen, Information transmission in sequential programs, in: Foundations of Secure Computation, R.A. DeMillo, D.P. Dobkin, A.K. Jones and R.J. Lipton, eds, Academic Press, 1978, pp. 297-335.
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 13
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D.E. Denning, A lattice model of secure information flow, Comm. of the ACM 19(5) (1976), 236-243.
    • (1976) Comm. of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 15
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D.E. Denning and P.J. Denning, Certification of programs for secure information flow, Comm. of the ACM 20(7) (1977), 504-513.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 18
    • 35248815514 scopus 로고    scopus 로고
    • On the secure implementation of security protocols
    • Proc. European Symp. on Programming, Springer
    • P. Giambiagi and M. Dam, On the secure implementation of security protocols, in: Proc. European Symp. on Programming, Volume 2618 of LNCS, Springer, 2003, pp. 144-158.
    • (2003) LNCS , vol.2618 , pp. 144-158
    • Giambiagi, P.1    Dam, M.2
  • 21
    • 0033751850 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • R. Joshi and K.R.M. Leino, A semantic approach to secure information flow, Science of Computer Programming 37(1-3) (2000), 113-138.
    • (2000) Science of Computer Programming , vol.37 , Issue.1-3 , pp. 113-138
    • Joshi, R.1    Leino, K.R.M.2
  • 22
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • Proc. European Symp. on Programming, Springer
    • P. Laud, Semantics and program analysis of computationally secure information flow, in: Proc. European Symp. on Programming, Volume 2028 of LNCS, Springer, 2001, pp. 77-91.
    • (2001) LNCS , vol.2028 , pp. 77-91
    • Laud, P.1
  • 23
    • 35248840989 scopus 로고    scopus 로고
    • Handling encryption in an analysis for secure information flow
    • Proc. European Symp. on Programming, Springer
    • P. Laud, Handling encryption in an analysis for secure information flow, in: Proc. European Symp. on Programming, Volume 2618 of LNCS, Springer, 2003, pp. 159-173.
    • (2003) LNCS , vol.2618 , pp. 159-173
    • Laud, P.1
  • 28
    • 84881123660 scopus 로고    scopus 로고
    • Information flow control and applications - Bridging a gap
    • Proc. Formal Methods Europe, Springer
    • H. Mantel, Information flow control and applications - Bridging a gap, in: Proc. Formal Methods Europe, Volume 2021 of LNCS, Springer, 2001, pp. 153-172.
    • (2001) LNCS , vol.2021 , pp. 153-172
    • Mantel, H.1
  • 29
    • 35048815139 scopus 로고    scopus 로고
    • Controlled downgrading based on intransitive (non)interference
    • Proceedings of the 2nd Asian Symposium on Programming Languages and Systems, Springer
    • H. Mantel and D. Sands, Controlled downgrading based on intransitive (non)interference, in: Proceedings of the 2nd Asian Symposium on Programming Languages and Systems, Volume 3302 of LNCS, Springer, 2004, pp. 129-145.
    • (2004) LNCS , vol.3302 , pp. 129-145
    • Mantel, H.1    Sands, D.2
  • 34
    • 0029228214 scopus 로고
    • Absorbing covers and intransitive non-interference
    • S. Pinsky, Absorbing covers and intransitive non-interference, in: Proc. IEEE Symp. on Security and Privacy, 1995, pp. 102-113.
    • (1995) Proc. IEEE Symp. on Security and Privacy , pp. 102-113
    • Pinsky, S.1
  • 38
    • 0003502331 scopus 로고
    • Noninterference, transitivity and channel-control security policies
    • SRI International
    • J.M. Rushb, Noninterference, transitivity and channel-control security policies, Technical Report CSL-92-02, SRI International, 1992.
    • (1992) Technical Report CSL-92-02
    • Rushb, J.M.1
  • 40
    • 35048828759 scopus 로고    scopus 로고
    • A model for delimited information release
    • Proc. International Symp. on Software Security (ISSS'03), Springer
    • A. Sabelfeld and A.C. Myers, A model for delimited information release, in: Proc. International Symp. on Software Security (ISSS'03), Volume 3233 of LNCS, Springer, 2004, pp. 174-191.
    • (2004) LNCS , vol.3233 , pp. 174-191
    • Sabelfeld, A.1    Myers, A.C.2
  • 42
    • 0035276729 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • A. Sabelfeld and D. Sands, A per model of secure information flow in sequential programs, Higher Order and Symbolic Computation 14(1) (2001), 59-91.
    • (2001) Higher Order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 46
    • 0033330060 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language
    • D. Volpano and G. Smith, Probabilistic noninterference in a concurrent language, J. Computer Security 7(2-3) (1999), 231-253.
    • (1999) J. Computer Security , vol.7 , Issue.2-3 , pp. 231-253
    • Volpano, D.1    Smith, G.2
  • 48
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, G. Smith and C. Irvine, A sound type system for secure flow analysis, J. Computer Security 4(3) (1996), 167-187.
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 52
    • 84945262623 scopus 로고    scopus 로고
    • Secure information flow and CPS
    • Proc. European Symp. on Programming, Springer
    • S. Zdancewic and A.C. Myers, Secure information flow and CPS, in: Proc. European Symp. on Programming, Volume 2028 of LNCS, Springer, 2001, pp. 46-61.
    • (2001) LNCS , vol.2028 , pp. 46-61
    • Zdancewic, S.1    Myers, A.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.