메뉴 건너뛰기




Volumn 153, Issue 2 SPEC. ISS., 2006, Pages 177-193

A Classification of Time and/or Probability Dependent Security Properties

Author keywords

covert channels; Information flow; non interference; probabilistic timed automata

Indexed keywords

AUTOMATA THEORY; COMPUTER SCIENCE; DISTRIBUTED COMPUTER SYSTEMS; INFORMATION TECHNOLOGY; PROBABILISTIC LOGICS; REAL TIME SYSTEMS;

EID: 33646418700     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2005.10.038     Document Type: Article
Times cited : (10)

References (22)
  • 1
    • 3042529082 scopus 로고    scopus 로고
    • A Process-algebraic Approach for the Analysis of Probabilistic Non-interference
    • Aldini A., Bravetti M., and Gorrieri R. A Process-algebraic Approach for the Analysis of Probabilistic Non-interference. Journal of Computer Security 12 (2004) 191-245
    • (2004) Journal of Computer Security , vol.12 , pp. 191-245
    • Aldini, A.1    Bravetti, M.2    Gorrieri, R.3
  • 2
    • 84992591899 scopus 로고
    • Verifying Automata Specifications of Probabilistic Real-Time Systems
    • Real-Time: Theory in Practice
    • Alur R., Courcoubetis C., and Dill D.L. Verifying Automata Specifications of Probabilistic Real-Time Systems. Real-Time: Theory in Practice. Springer LNCS 600 (1992) 28-44
    • (1992) Springer LNCS , vol.600 , pp. 28-44
    • Alur, R.1    Courcoubetis, C.2    Dill, D.L.3
  • 4
    • 84947419887 scopus 로고    scopus 로고
    • Weak Bisimulation for Fully Probabilistic Processes
    • Proc. of CAV'97
    • Baier C., and Hermanns H. Weak Bisimulation for Fully Probabilistic Processes. Proc. of CAV'97. Springer LNCS 1254 (1997) 119-130
    • (1997) Springer LNCS , vol.1254 , pp. 119-130
    • Baier, C.1    Hermanns, H.2
  • 5
    • 0037834671 scopus 로고    scopus 로고
    • A Decidable Notion of Timed Non-interference
    • Barbuti R., and Tesei L. A Decidable Notion of Timed Non-interference. Fundamenta Informaticae 54 (2003) 137-150
    • (2003) Fundamenta Informaticae , vol.54 , pp. 137-150
    • Barbuti, R.1    Tesei, L.2
  • 7
    • 84947796708 scopus 로고
    • Decidability of Bisimulation Equivalences for Parallel Timer Processes
    • Proc. of CAV'92
    • Cerans K. Decidability of Bisimulation Equivalences for Parallel Timer Processes. Proc. of CAV'92. Springer LNCS 663 (1992) 302-315
    • (1992) Springer LNCS , vol.663 , pp. 302-315
    • Cerans, K.1
  • 9
    • 84944070422 scopus 로고    scopus 로고
    • Analysing Time Dependent Security Properties in CSP Using PVS
    • Proc. of Symp. on Research in Computer Security
    • Evans N., and Schneider S. Analysing Time Dependent Security Properties in CSP Using PVS. Proc. of Symp. on Research in Computer Security. Springer LNCS 1895 (2000) 222-237
    • (2000) Springer LNCS , vol.1895 , pp. 222-237
    • Evans, N.1    Schneider, S.2
  • 11
    • 0033725594 scopus 로고    scopus 로고
    • Information Flow Analysis in a Discrete-Time Process Algebra
    • IEEE CS Press
    • Focardi R., Gorrieri R., and Martinelli F. Information Flow Analysis in a Discrete-Time Process Algebra. Proc. of 13th CSFW (2000), IEEE CS Press 170-184
    • (2000) Proc. of 13th CSFW , pp. 170-184
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 13
    • 84974759639 scopus 로고
    • Toward a Mathematical Foundation for Information Flow Security
    • Gray III J.W. Toward a Mathematical Foundation for Information Flow Security. Journal of Computer Security 1 (1992) 255-294
    • (1992) Journal of Computer Security , vol.1 , pp. 255-294
    • Gray III, J.W.1
  • 15
    • 0037036274 scopus 로고    scopus 로고
    • Automatic Verification of Real-time Systems with Discrete Probability Distribution
    • Kwiatkowska M., Norman G., Segala R., and Sproston J. Automatic Verification of Real-time Systems with Discrete Probability Distribution. Theoretical Computer Science 282 (2002) 101-150
    • (2002) Theoretical Computer Science , vol.282 , pp. 101-150
    • Kwiatkowska, M.1    Norman, G.2    Segala, R.3    Sproston, J.4
  • 16
    • 33646435123 scopus 로고    scopus 로고
    • M. Kwiatkowska, R. Norman, J. Sproston: Symbolic Model Checking of Probabilistic Timed Automata Using Backwards Reachability. Tech. rep. CSR-03-10, University of Birmingham, 2003
  • 17
    • 84902484192 scopus 로고    scopus 로고
    • Information Flow Analysis for Probabilistic Timed Automata
    • Proc. of FAST'04. Toulouse, France
    • Lanotte R., Maggiolo-Schettini A., and Troina A. Information Flow Analysis for Probabilistic Timed Automata. Proc. of FAST'04. Toulouse, France. Springer IFIP 173 (August 2004)
    • (2004) Springer IFIP , vol.173
    • Lanotte, R.1    Maggiolo-Schettini, A.2    Troina, A.3
  • 19
    • 33646388452 scopus 로고
    • From Timed Automata to Logic - and Back
    • Proc. of MFCS
    • Laroussinie F., Larsen K.G., and Weise C. From Timed Automata to Logic - and Back. Proc. of MFCS. Springer LNCS 969 (1995) 27-41
    • (1995) Springer LNCS , vol.969 , pp. 27-41
    • Laroussinie, F.1    Larsen, K.G.2    Weise, C.3
  • 20
    • 0023829319 scopus 로고
    • Noninterference and the Composability of Security Properties
    • IEEE CS Press
    • McCullough D. Noninterference and the Composability of Security Properties. Proc. of Symp. on Research in Security and Privacy (1988), IEEE CS Press 177-186
    • (1988) Proc. of Symp. on Research in Security and Privacy , pp. 177-186
    • McCullough, D.1
  • 21
    • 0025686008 scopus 로고
    • Hookup Security for Synchronous Machines
    • IEEE CS Press
    • Millen J.K. Hookup Security for Synchronous Machines. Proc. of CSFW'90 (1990), IEEE CS Press 84-90
    • (1990) Proc. of CSFW'90 , pp. 84-90
    • Millen, J.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.