메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 153-163

Security policy in a declarative style

Author keywords

Confidentiality; Non interference

Indexed keywords

ALGORITHMS; AUTOMATIC TELLER MACHINES; COMPUTER PROGRAMMING; CONSTRAINT THEORY; PROBLEM SOLVING; SECURITY OF DATA;

EID: 33746103319     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1069774.1069789     Document Type: Conference Paper
Times cited : (21)

References (34)
  • 2
    • 0037014243 scopus 로고    scopus 로고
    • Noninterference for concurrent programs and thread systems
    • Special issue: "Merci, Maurice, A mosaic in honour of Maurice Nivat" (P.-L. Curien, Ed.)
    • G. Boudol and I. Castellani. Noninterference for concurrent programs and thread systems. Theoretical Computer Science, 281(1):109 - 130, 2002. Special issue: "Merci, Maurice, A mosaic in honour of Maurice Nivat" (P.-L. Curien, Ed.).
    • (2002) Theoretical Computer Science , vol.281 , Issue.1 , pp. 109-130
    • Boudol, G.1    Castellani, I.2
  • 4
    • 0000459334 scopus 로고    scopus 로고
    • Rewriting
    • A. Robinson and A. Voronkov, editors, chapter 9, Elsevier and MIT Press, Amsterdam
    • N. Dershowitz and D. A. Plaisted. Rewriting. In A. Robinson and A. Voronkov, editors, Handbook of Automated Reasoning (in 2 volumes, chapter 9, pages 535 -610. Elsevier and MIT Press, Amsterdam, 2001.
    • (2001) Handbook of Automated Reasoning , vol.2 , pp. 535-610
    • Dershowitz, N.1    Plaisted, D.A.2
  • 7
    • 1242288174 scopus 로고    scopus 로고
    • Statically assuring secrecy for dynamic concurrent processes
    • R. Echahed, F. Prost, and W. Serwe. Statically assuring secrecy for dynamic concurrent processes. 2003. proceedings of PPDP'03, preliminary version avalaible at http://www-leibniz.imag.fr/LesCahiers/2002/Cahier40/Resum-Cahier40. html.
    • (2003) Proceedings of PPDP'03, Preliminary Version
    • Echahed, R.1    Prost, F.2    Serwe, W.3
  • 8
    • 84867834994 scopus 로고    scopus 로고
    • Combining mobile processes and declarative programming
    • st International Conference on Computational Logic (CL 2000), London, July Springer Verlag
    • st International Conference on Computational Logic (CL 2000), volume 1861 of Lecture Notes in Artificial Intelligence, pages 300 - 314, London, July 2000. Springer Verlag.
    • (2000) Lecture Notes in Artificial Intelligence , vol.1861 , pp. 300-314
    • Echahed, R.1    Serwe, W.2
  • 9
    • 18944379437 scopus 로고    scopus 로고
    • Integrating action definitions into concurrent declarative programming
    • Sept. special issue: selected papers of the International Workshop on Functional and (Constraint) Logic Programming (WFLP 2001)
    • R. Echahed and W. Serwe. Integrating action definitions into concurrent declarative programming. Electronic Notes in Theoretical Computer Science, 64, Sept. 2002. special issue: selected papers of the International Workshop on Functional and (Constraint) Logic Programming (WFLP 2001).
    • (2002) Electronic Notes in Theoretical Computer Science , vol.64
    • Echahed, R.1    Serwe, W.2
  • 10
    • 0004130301 scopus 로고    scopus 로고
    • Texts in Theoretical Computer Science. Springer Verlag
    • W. Fokkink. Introduction to Process Algebra. Texts in Theoretical Computer Science. Springer Verlag, 2000.
    • (2000) Introduction to Process Algebra
    • Fokkink, W.1
  • 12
    • 0020299523 scopus 로고
    • Security policies and security models
    • IEEE Computer Society Press
    • J. Goguen and J. Meseguer. Security policies and security models. In IEEE Symposium on Security and Privacy, pages 11-20. IEEE Computer Society Press, 1982.
    • (1982) IEEE Symposium on Security and Privacy , pp. 11-20
    • Goguen, J.1    Meseguer, J.2
  • 17
    • 0042361083 scopus 로고    scopus 로고
    • Nondeterministic admissible interference
    • November
    • J. Mullins. Nondeterministic admissible interference. Journal of Universal Computer Science, 6(11):1054-1070, November 2000.
    • (2000) Journal of Universal Computer Science , vol.6 , Issue.11 , pp. 1054-1070
    • Mullins, J.1
  • 19
    • 33746100696 scopus 로고    scopus 로고
    • Approximate confinement under uniform attacks
    • M. V. Hermenegildo and G. Puebla, editors, number 2477 in Lecture Notes in Computer Science, Madrid, Spain, September . Springer
    • A. D. Pierro, C. Hankin, and H. Wiklicky. Approximate confinement under uniform attacks. In M. V. Hermenegildo and G. Puebla, editors, SAS'02 - Static Analysis, 9th International Symposium, number 2477 in Lecture Notes in Computer Science, Madrid, Spain, September 2002. Springer.
    • (2002) SAS'02 - Static Analysis, 9th International Symposium
    • Pierro, A.D.1    Hankin, C.2    Wiklicky, H.3
  • 24
    • 0003502331 scopus 로고
    • Noninterference, transitivity, and channel-control security policies
    • Technical report, Computer Science Laboratory, SRI International, Dec.
    • J. Rushby. Noninterference, transitivity, and channel-control security policies. Technical report, Computer Science Laboratory, SRI International, Dec. 1992. Technical Report CSL-92-02.
    • (1992) Technical Report , vol.CSL-92-02
    • Rushby, J.1
  • 31
    • 0001909368 scopus 로고    scopus 로고
    • Confinements properties for programming languages
    • D. Volpano and G. Smith. Confinements properties for programming languages. SIGACT News, 29(3):33-42, 1998.
    • (1998) SIGACT News , vol.29 , Issue.3 , pp. 33-42
    • Volpano, D.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.