메뉴 건너뛰기




Volumn 2890, Issue , 2003, Pages 260-273

Confidentiality for multithreaded programs via bisimulation

Author keywords

[No Author keywords available]

Indexed keywords

SCHEDULING;

EID: 33745197683     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Article
Times cited : (25)

References (35)
  • 2
    • 84944050367 scopus 로고    scopus 로고
    • Probabilistic information flow in a process algebra
    • Proc. CONCUR'01, Springer-Verlag, August
    • A. Aldini. Probabilistic information flow in a process algebra. In Proc. CONCUR'01, volume 2154 of LNCS, pages 152-168. Springer-Verlag, August 2001.
    • (2001) LNCS , vol.2154 , pp. 152-168
    • Aldini, A.1
  • 4
    • 84879520825 scopus 로고    scopus 로고
    • Noninterference for concurrent programs
    • Proc. ICALP, Springer-Verlag, July
    • G. Boudol and I. Castellani. Noninterference for concurrent programs. In Proc. ICALP, volume 2076 of LNCS, pages 382-395. Springer-Verlag, July 2001.
    • (2001) LNCS , vol.2076 , pp. 382-395
    • Boudol, G.1    Castellani, I.2
  • 5
    • 84947796708 scopus 로고
    • Decidability of bisimulation equivalences for parallel timer processes
    • Proc. CAV 1992, Springer-Verlag, June
    • K. Cerans. Decidability of bisimulation equivalences for parallel timer processes. In Proc. CAV 1992, volume 663 of LNCS, pages 302-315. Springer-Verlag, June 1992.
    • (1992) LNCS , vol.663 , pp. 302-315
    • Cerans, K.1
  • 6
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 8
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • R. Focardi and R. Gorrieri. A classification of security properties for process algebras. J. Computer Security, 3(1):5-33, 1995.
    • (1995) J. Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 11
    • 35248815514 scopus 로고    scopus 로고
    • On the secure implementation of security protocols
    • Proc. European Symposium on Programming, Springer-Verlag, April
    • P. Giambiagi and M. Dam. On the secure implementation of security protocols. In Proc. European Symposium on Programming, volume 2618 of LNCS, pages 144-158. Springer-Verlag, April 2003.
    • (2003) LNCS , vol.2618 , pp. 144-158
    • Giambiagi, P.1    Dam, M.2
  • 15
    • 84885216103 scopus 로고    scopus 로고
    • Secure information flow for concurrent processes
    • Proc. CONCUR 2000, Springer-Verlag, August
    • J. Jürjens. Secure information flow for concurrent processes. In Proc. CONCUR 2000, volume 1877 of LNCS, pages 395-409. Springer-Verlag, August 2000.
    • (2000) LNCS , vol.1877 , pp. 395-409
    • Jürjens, J.1
  • 16
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Proc. CRYPTO'96, Springer-Verlag
    • P. C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Proc. CRYPTO'96, volume 1109 of LNCS, pages 104-113. Springer-Verlag, 1996.
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 17
    • 84949229854 scopus 로고    scopus 로고
    • Language-based security
    • Proc. Mathematical Foundations of Computer Science, Springer-Verlag, September
    • D. Kozen. Language-based security. In Proc. Mathematical Foundations of Computer Science, volume 1672 of LNCS, pages 284-298. Springer-Verlag, September 1999.
    • (1999) LNCS , vol.1672 , pp. 284-298
    • Kozen, D.1
  • 18
    • 0026222347 scopus 로고
    • Bisimulation through probabilistic testing
    • September
    • K. G. Larsen and A. Skou. Bisimulation through probabilistic testing. Information and Computation, 94(1):1-28, September 1991.
    • (1991) Information and Computation , vol.94 , Issue.1 , pp. 1-28
    • Larsen, K.G.1    Skou, A.2
  • 20
    • 0141528662 scopus 로고    scopus 로고
    • A unifying approach to the security of distributed and multi-threaded programs
    • To appear
    • H. Mantel and A. Sabelfeld. A unifying approach to the security of distributed and multi-threaded programs. J. Computer Security, 2003. To appear.
    • (2003) J. Computer Security
    • Mantel, H.1    Sabelfeld, A.2
  • 21
    • 0023231848 scopus 로고
    • Specifications for multi-level security and hook-up property
    • April
    • D. McCullough. Specifications for multi-level security and hook-up property. In Proc. IEEE Symp. on Security and Privacy, pages 161-166, April 1987.
    • (1987) Proc. IEEE Symp. on Security and Privacy , pp. 161-166
    • McCullough, D.1
  • 23
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • May
    • J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proc. IEEE Symp. on Security and Privacy, pages 79-93, May 1994.
    • (1994) Proc. IEEE Symp. on Security and Privacy , pp. 79-93
    • McLean, J.1
  • 26
    • 84885715358 scopus 로고    scopus 로고
    • The impact of synchronisation on secure information flow in concurrent programs
    • Proc. Andrei Ershov International Conference on Perspectives of System Informatics, Springer-Verlag, July
    • A. Sabelfeld. The impact of synchronisation on secure information flow in concurrent programs. In Proc. Andrei Ershov International Conference on Perspectives of System Informatics, volume 2244 of LNCS, pages 227-241. Springer-Verlag, July 2001.
    • (2001) LNCS , vol.2244 , pp. 227-241
    • Sabelfeld, A.1
  • 27
    • 84958755151 scopus 로고    scopus 로고
    • Static confidentiality enforcement for distributed programs
    • Proc. Symposium on Static Analysis, Springer-Verlag, September
    • A. Sabelfeld and H. Mantel. Static confidentiality enforcement for distributed programs. In Proc. Symposium on Static Analysis, volume 2477 of LNCS, pages 376-394. Springer-Verlag, September 2002.
    • (2002) LNCS , vol.2477 , pp. 376-394
    • Sabelfeld, A.1    Mantel, H.2
  • 30
    • 0035276729 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • March
    • A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher Order and Symbolic Computation, 14(1):59-91, March 2001.
    • (2001) Higher Order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 31
    • 0012889295 scopus 로고    scopus 로고
    • A language-based approach to security
    • Informatics - 10 Years Back, 10 Years Ahead, Springer-Verlag
    • F. B. Schneider, G. Morrisett, and R. Harper. A language-based approach to security. In Informatics - 10 Years Back, 10 Years Ahead, volume 2000 of LNCS, pages 86-101. Springer-Verlag, 2000.
    • (2000) LNCS , vol.2000 , pp. 86-101
    • Schneider, F.B.1    Morrisett, G.2    Harper, R.3
  • 35
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3):167-187, 1996.
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.