메뉴 건너뛰기




Volumn 4052 LNCS, Issue , 2006, Pages 107-118

Preserving secrecy under refinement

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SIMULATION; MATHEMATICAL MODELS; USER INTERFACES;

EID: 33746373966     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11787006_10     Document Type: Conference Paper
Times cited : (79)

References (16)
  • 1
    • 84878558984 scopus 로고    scopus 로고
    • Protection in programming-language translations
    • M. Abadi. Protection in programming-language translations. In Proc. of ICALP'98, pages 868-883, 1998.
    • (1998) Proc. of ICALP'98 , pp. 868-883
    • Abadi, M.1
  • 3
    • 4944265699 scopus 로고    scopus 로고
    • Secure information flow by self-composition
    • G. Barthe, P. D'Argenio, and T. Rezk. Secure Information Flow by Self-Composition. In Proc. of CSFW'04, pages 100-114, 2004.
    • (2004) Proc. of CSFW'04 , pp. 100-114
    • Barthe, G.1    D'Argenio, P.2    Rezk, T.3
  • 4
    • 24644445710 scopus 로고    scopus 로고
    • A theorem proving approach to analysis of secure information flow
    • Á. Darvas, R. Hähnle, and D. Sands. A Theorem Proving Approach to Analysis of Secure Information Flow. In Proc. of SPC 2005, pages 193-208, 2005.
    • (2005) Proc. of SPC 2005 , pp. 193-208
    • Darvas, Á.1    Hähnle, R.2    Sands, D.3
  • 5
    • 84948775046 scopus 로고    scopus 로고
    • Secrecy in multiagent systems
    • J. Halpern and K. O'Neill. Secrecy in multiagent systems. In Proc. of CSFW02, pages 32-46, 2002.
    • (2002) Proc. of CSFW02 , pp. 32-46
    • Halpern, J.1    O'Neill, K.2
  • 7
    • 84881150179 scopus 로고    scopus 로고
    • Secrecy-preserving refinement
    • J. Jürjens. Secrecy-preserving refinement. In Proc. of FME'01, pages 135-152, 2001.
    • (2001) Proc. of FME'01 , pp. 135-152
    • Jürjens, J.1
  • 9
    • 0034836335 scopus 로고    scopus 로고
    • Preserving information flow properties under refinement
    • H. Mantel. Preserving information flow properties under refinement. In Proc. of SP'01, pages 78-91, 2001.
    • (2001) Proc. of SP'01 , pp. 78-91
    • Mantel, H.1
  • 10
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proc. of SP'94, pages 79-93, 1994.
    • (1994) Proc. of SP'94 , pp. 79-93
    • McLean, J.1
  • 11
    • 84947418436 scopus 로고    scopus 로고
    • A compositional rule for hardware design refinement
    • K.L. McMillan. A compositional rule for hardware design refinement. In Proc. of CAV'97, pages 24-35, 1997.
    • (1997) Proc. of CAV'97 , pp. 24-35
    • McMillan, K.L.1
  • 12
    • 84944677742 scopus 로고
    • PVS: A prototype verification system
    • S. Owre, J. M. Rushby, and N. Shankar. PVS: A prototype verification system. In CADE'92, pages 748-752, 1992.
    • (1992) CADE'92 , pp. 748-752
    • Owre, S.1    Rushby, J.M.2    Shankar, N.3
  • 14
    • 0003714340 scopus 로고    scopus 로고
    • F.B. Schneider, editor. National Academy Press
    • F.B. Schneider, editor. Trust in Cyberspace. National Academy Press, 1999.
    • (1999) Trust in Cyberspace
  • 15
    • 33646037706 scopus 로고    scopus 로고
    • Secure information flow as a safety problem
    • T. Terauchi and A. Aiken. Secure Information Flow as a Safety Problem. In Proc. of SAS 2005, pages 352-367, 2005.
    • (2005) Proc. of SAS 2005 , pp. 352-367
    • Terauchi, T.1    Aiken, A.2
  • 16
    • 0030672129 scopus 로고    scopus 로고
    • A general theory of security properties
    • A. Zakinthinos and E. S. Lee. A general theory of security properties. In Proc. of SP'97, pages 94-102, 1997.
    • (1997) Proc. of SP'97 , pp. 94-102
    • Zakinthinos, A.1    Lee, E.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.