메뉴 건너뛰기




Volumn , Issue , 2006, Pages 67-78

Decidability and proof systems for language-based noninterference relations

Author keywords

Information flow; Intransitive noninterference; Language based security; Multi level security; Noninterference

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; MATHEMATICAL MODELS; ONLINE SEARCHING; SECURITY OF DATA; STATISTICAL METHODS;

EID: 33745842281     PISSN: 07308566     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1111037.1111044     Document Type: Conference Paper
Times cited : (13)

References (37)
  • 2
    • 33745218861 scopus 로고    scopus 로고
    • A logic for information flow analysis of pointer programs
    • ACM
    • T. Amtoft, S. Bandhakavi, and A. Banerjee. A logic for information flow analysis of pointer programs. In Proc. POPL'06. ACM, 2006.
    • (2006) Proc. POPL'06
    • Amtoft, T.1    Bandhakavi, S.2    Banerjee, A.3
  • 4
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and MULTICS interpretation
    • Mitre Corp., Bedford, Mass., USA, June
    • D.E. Bell and L.J. LaPadula. Secure computer systems: Unified exposition and MULTICS interpretation. Technical Report MTR-2997, Mitre Corp., Bedford, Mass., USA, June 1976.
    • (1976) Technical Report , vol.MTR-2997
    • Bell, D.E.1    Lapadula, L.J.2
  • 5
    • 0037014243 scopus 로고    scopus 로고
    • Noninterference for concurrent programs and thread systems
    • G. Boudol and I. Castellani. Noninterference for concurrent programs and thread systems. Theor. Comput. Sci., 281(1-2):109-130, 2002.
    • (2002) Theor. Comput. Sci. , vol.281 , Issue.1-2 , pp. 109-130
    • Boudol, G.1    Castellani, I.2
  • 8
    • 84974529145 scopus 로고
    • Bisimulation equivalence is decidable for basic parallel processes
    • Proc. CONCUR'93, Springer
    • Søren Christensen, Yoram Hirshfeld, and Faron Moller. Bisimulation equivalence is decidable for basic parallel processes. In Proc. CONCUR'93, volume 715 of Lecture Notes in Computer Science, pages 143-157. Springer, 1993.
    • (1993) Lecture Notes in Computer Science , vol.715 , pp. 143-157
    • Christensen, S.1    Hirshfeld, Y.2    Moller, F.3
  • 9
    • 0033718531 scopus 로고    scopus 로고
    • Confidentiality for mobile code: The case of a simple payment protocol
    • M. Dam and P. Giambiagi. Confidentiality for mobile code: The case of a simple payment protocol. In Proc. Computer Security Foundations Workshop, pages 233-244, 2000.
    • (2000) Proc. Computer Security Foundations Workshop , pp. 233-244
    • Dam, M.1    Giambiagi, P.2
  • 10
    • 24644445710 scopus 로고    scopus 로고
    • A theorem proving approach to analysis of secure information flow
    • Proc. Second International Conference on Security in Pervasive Computing, Springer
    • Á. Darvas, R. Hähnle, and D. Sands. A theorem proving approach to analysis of secure information flow. In Proc. Second International Conference on Security in Pervasive Computing, volume 3450 of Lecture Notes in Computer Science, pages 193-209. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3450 , pp. 193-209
    • Darvas, Á.1    Hähnle, R.2    Sands, D.3
  • 11
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 12
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, July 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 13
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • R. Focardi and R. Gorrieri. A classification of security properties for process algebras. Journal of Computer Security, 3(1):5-33, 1995.
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 15
    • 24644477761 scopus 로고    scopus 로고
    • Bridging language-based and process calculi security
    • R. Focardi, S. Rossi, and A. Sabelfeld. Bridging language-based and process calculi security. In Proc. FoSSaCS, pages 299-315, 2005.
    • (2005) Proc. FoSSaCS , pp. 299-315
    • Focardi, R.1    Rossi, S.2    Sabelfeld, A.3
  • 16
    • 24144440405 scopus 로고    scopus 로고
    • Information flow analysis for java bytecode
    • Proc. VMCAI'05, Springer
    • Samir Genaim and Fausto Spoto. Information flow analysis for java bytecode. In Proc. VMCAI'05, volume 3385 of Lecture Notes in Computer Science, pages 346-362. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3385 , pp. 346-362
    • Genaim, S.1    Spoto, F.2
  • 17
    • 1442286773 scopus 로고    scopus 로고
    • On the secure implementation of security protocols
    • P. Giambiagi and M. Dam. On the secure implementation of security protocols. Sci.Comput. Program., 50(1-3):73-99, 2004.
    • (2004) Sci.Comput. Program , vol.50 , Issue.1-3 , pp. 73-99
    • Giambiagi, P.1    Dam, M.2
  • 19
    • 0031701347 scopus 로고    scopus 로고
    • The SLam Calculus: Programming with secrecy and integrity
    • N. Heintze and J. G. Riecke. The SLam Calculus: Programming with secrecy and integrity. In Proc. POPL'98, pages 365-377, 1998.
    • (1998) Proc. POPL'98 , pp. 365-377
    • Heintze, N.1    Riecke, J.G.2
  • 20
    • 28144461940 scopus 로고    scopus 로고
    • Downgrading policies and relaxed noninterference
    • P. Li and S. Zdancewic. Downgrading policies and relaxed noninterference. In Proc. POPL'05, pages 158-170, 2005.
    • (2005) Proc. POPL'05 , pp. 158-170
    • Li, P.1    Zdancewic, S.2
  • 21
    • 0033701251 scopus 로고    scopus 로고
    • Possibilistic definitions of security - An assembly kit
    • H. Mantel. Possibilistic definitions of security - an assembly kit -. In Proc. Computer Security Foundations Workshop, pages 185-199, 2000.
    • (2000) Proc. Computer Security Foundations Workshop , pp. 185-199
    • Mantel, H.1
  • 22
    • 84881123660 scopus 로고    scopus 로고
    • Information flow control and applications - Bridging a gap
    • H. Mantel. Information flow control and applications - bridging a gap. In Proc. FME, pages 153-172, 2001.
    • (2001) Proc. FME , pp. 153-172
    • Mantel, H.1
  • 23
    • 35048815139 scopus 로고    scopus 로고
    • Controlled declassification based on intransitive noninterference
    • H. Mantel and D. Sands. Controlled declassification based on intransitive noninterference. In Proc. APLAS, pages 129-145, 2004.
    • (2004) Proc. APLAS , pp. 129-145
    • Mantel, H.1    Sands, D.2
  • 24
    • 33646201525 scopus 로고    scopus 로고
    • A typed assembly language for non-interference
    • Proc. Italian Conference on Theoretical Computer Science, Springer
    • Ricardo Medel, Adriana B. Compagnoni, and Eduardo Bonelli. A typed assembly language for non-interference. In Proc. Italian Conference on Theoretical Computer Science, volume 3701 of Lecture Notes in Computer Science, pages 360-374. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3701 , pp. 360-374
    • Medel, R.1    Compagnoni, A.B.2    Bonelli, E.3
  • 26
    • 0003502331 scopus 로고
    • Noninterference, transitivity, and channel-control security policies
    • Stanford Research Institute
    • J. Rushby. Noninterference, transitivity, and channel-control security policies. Technical Report CSL-92-2, Stanford Research Institute, 1992.
    • (1992) Technical Report , vol.CSL-92-2
    • Rushby, J.1
  • 27
    • 33745197683 scopus 로고    scopus 로고
    • Confidentiality for multithreaded programs via bisimulation
    • Proc. A. Ershov 5th International Conference on Perspectives of System Informatics, Springer
    • A. Sabelfeld. Confidentiality for multithreaded programs via bisimulation. In Proc. A. Ershov 5th International Conference on Perspectives of System Informatics, volume 2890 of Lecture Notes in Computer Science, pages 260-274. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2890 , pp. 260-274
    • Sabelfeld, A.1
  • 29
    • 35048828759 scopus 로고    scopus 로고
    • A model for delimited information release
    • Proc. International Symposium on Software Security, Springer
    • A. Sabelfeld and A. C. Myers. A model for delimited information release. In Proc. International Symposium on Software Security, volume 3233 of Lecture Notes in Computer Science, pages 174-191. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.3233 , pp. 174-191
    • Sabelfeld, A.1    Myers, A.C.2
  • 31
    • 0035276729 scopus 로고    scopus 로고
    • A PER model of secure information flow in sequential programs
    • A. Sabelfeld and D. Sands. A PER model of secure information flow in sequential programs. Higher-Order and Symbolic Computation, 14(1):59-91, 2001.
    • (2001) Higher-order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 33
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • G. Smith and D. Volpano. Secure information flow in a multi-threaded imperative language. In Proc. POPL'98, pages 355-364, 1998.
    • (1998) Proc. POPL'98 , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 34
    • 33646037706 scopus 로고    scopus 로고
    • Secure information flow as a safety problem
    • Proc. SAS'05, Springer
    • Tachio Terauchi and Alexander Aiken. Secure information flow as a safety problem. In Proc. SAS'05, volume 3672 of Lecture Notes in Computer Science, pages 352-367. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3672 , pp. 352-367
    • Terauchi, T.1    Aiken, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.