메뉴 건너뛰기




Volumn 63, Issue 1, 2006, Pages 16-38

Classification of security properties in a Linda-like process algebra

Author keywords

Behavioural equivalence; Coordination model; Information flow analysis; Noninterference properties; Process algebra

Indexed keywords

ALGEBRA; BEHAVIORAL RESEARCH; DISTRIBUTED COMPUTER SYSTEMS; INFORMATION TECHNOLOGY; MATHEMATICAL MODELS; SECURITY SYSTEMS;

EID: 33748744443     PISSN: 01676423     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.scico.2005.07.010     Document Type: Article
Times cited : (11)

References (34)
  • 1
    • 18944371721 scopus 로고    scopus 로고
    • Coordination model and noninterference
    • Int. Workshop on Security Issues in Coordination Models, Languages, and Systems, SECCO'03. Focardi R., and Zavattaro G. (Eds), Eindhoven, The Netherlands
    • Aldini A. Coordination model and noninterference. In: Focardi R., and Zavattaro G. (Eds). Int. Workshop on Security Issues in Coordination Models, Languages, and Systems, SECCO'03. ENTCS vol. 85.3 (2003), Eindhoven, The Netherlands
    • (2003) ENTCS , vol.85 3
    • Aldini, A.1
  • 3
    • 33748750115 scopus 로고    scopus 로고
    • D.E. Bell, L.J. La Padula, Secure computer systems: Unified exposition and multics interpretation, Technical Report, ESD-TR-75-306, The MITRE Corp., Bedford, MA, 1976
  • 4
    • 0037192364 scopus 로고    scopus 로고
    • Trace and testing equivalence on asynchronous processes
    • Boreale M., De Nicola R., and Pugliese R. Trace and testing equivalence on asynchronous processes. Information and Computation 172 2 (2002) 139-164
    • (2002) Information and Computation , vol.172 , Issue.2 , pp. 139-164
    • Boreale, M.1    De Nicola, R.2    Pugliese, R.3
  • 7
    • 0037014243 scopus 로고    scopus 로고
    • Noninterference for concurrent programs and thread systems
    • Boudol G., and Castellani I. Noninterference for concurrent programs and thread systems. Theoretical Computer Science 281 1-2 (2002) 109-130
    • (2002) Theoretical Computer Science , vol.281 , Issue.1-2 , pp. 109-130
    • Boudol, G.1    Castellani, I.2
  • 8
    • 0001810827 scopus 로고    scopus 로고
    • A process algebraic view of Linda coordination primitives
    • Busi N., Gorrieri R., and Zavattaro G. A process algebraic view of Linda coordination primitives. Theoretical Computer Science 192 2 (1998) 167-199
    • (1998) Theoretical Computer Science , vol.192 , Issue.2 , pp. 167-199
    • Busi, N.1    Gorrieri, R.2    Zavattaro, G.3
  • 9
    • 84974715662 scopus 로고    scopus 로고
    • Process calculi for coordination: From Linda to JavaSpaces
    • Proc. 8th Int. Conf. on Algebraic Methodology and Software Technology, AMAST'00. Rus T. (Ed), Iowa, Iowa City
    • Busi N., Gorrieri R., and Zavattaro G. Process calculi for coordination: From Linda to JavaSpaces. In: Rus T. (Ed). Proc. 8th Int. Conf. on Algebraic Methodology and Software Technology, AMAST'00. Springer LNCS vol. 1816 (2000), Iowa, Iowa City 198-212
    • (2000) Springer LNCS , vol.1816 , pp. 198-212
    • Busi, N.1    Gorrieri, R.2    Zavattaro, G.3
  • 10
    • 84976215953 scopus 로고
    • Coordination languages and their significance
    • Carriero N., and Gelernter D. Coordination languages and their significance. Communications of the ACM 35 2 (1992) 97-107
    • (1992) Communications of the ACM , vol.35 , Issue.2 , pp. 97-107
    • Carriero, N.1    Gelernter, D.2
  • 12
    • 84942942991 scopus 로고    scopus 로고
    • P. Ciancarini, A. Omicini, F. Zambonelli, Multiagent system engineering: The coordination viewpoint, in: N. Jennings, Y. Lesperance (Eds.), Proc. 6th Int. Workshop on Agent Theories, Architectures, and Languages, ATAL'99, Springer LNCS, vol. 1757, Orlando, Florida, 1999, pp. 250-259
  • 14
    • 33748751519 scopus 로고    scopus 로고
    • R. Focardi, R. Gorrieri (Eds.) Foundations of Security Analysis and Design - Tutorial Lectures I and II, in: Springer LNCS, vol. 2171, 2001 and vol. 2946, 2004
  • 15
    • 33748747725 scopus 로고    scopus 로고
    • R. Focardi, R. Gorrieri, Classification of Security Properties (Part I: Information Flow), in: [14], pp. 331-396
  • 19
    • 33748745054 scopus 로고    scopus 로고
    • M. Hennessy, The security π-calculus and non-interference, in: S. Brookes, P. Panangaden (Eds.), Proc. 19th Mathematical Foundations of Programming Semantics, MFPS, in: ENTCS, vol. 83, Montreal, Canada, 2003
  • 20
    • 0038893943 scopus 로고    scopus 로고
    • Information flow vs. resource access in the asynchronous pi-calculus
    • ACM Press
    • Hennessy M., and Riely J. Information flow vs. resource access in the asynchronous pi-calculus. ACM Transactions on Programming Languages and Systems 24 5 (2002) 566-591 ACM Press
    • (2002) ACM Transactions on Programming Languages and Systems , vol.24 , Issue.5 , pp. 566-591
    • Hennessy, M.1    Riely, J.2
  • 21
    • 85022894365 scopus 로고    scopus 로고
    • K. Honda, M. Tokoro, On asynchronous communication semantics, in: M. Tokoro, O. Nierstrasz, P. Wegner (Eds.), Proc. Workshop on Object-Based Concurrent Computing, in: Springer LNCS, vol. 612, Geneva, Switzerland, 1992, pp. 21-51
  • 22
    • 84947269249 scopus 로고    scopus 로고
    • K. Honda, V. Vasconcelos, N. Yoshida, Secure information flow as typed process behavior, in: G. Smolka, (Ed.), Proc. 9th European Symposium on Programming Languages and Systems, ESOP'00, in: Springer LNCS, vol. 1782, Berlin, Germany, 2000, pp. 180-199
  • 23
    • 85159683895 scopus 로고    scopus 로고
    • H. Mantel, Unwinding possibilistic security properties, in: F. Cuppens, Y. Deswarte, D. Gollmann, M. Waidner (Eds.), Proc. European Symposium on Research in Computer Security, ESORICS'00, in: Springer LNCS, vol. 1895, Toulouse, France, 2000, pp. 238-254
  • 24
    • 85026563474 scopus 로고    scopus 로고
    • M. Merro, D. Sangiorgi, On asynchrony in name-passing calculi, in: K. Larsen, S. Skyum, G. Winskel (Eds.), Proc. 25th Int. Colloquium on Automata, Languages, and Programming, ICALP'98, in: Springer LNCS, vol. 1443, Aalborg, Denmark, 1998, pp. 856-867
  • 26
    • 84969347374 scopus 로고    scopus 로고
    • U. Montanari, V. Sassone, CCS dynamic bisimulation is progressing, in: A. Tarlecki (Ed.) Mathematical Foundations of Computer Science, MFCS'91, in: Springer LNCS, vol. 520, Kazimierz Dolny, Poland, 1991, pp. 346-356
  • 27
    • 35248828687 scopus 로고    scopus 로고
    • S. Orzan, J. van de Pol, Verification of distributed dataspace architectures, in: M. Broy, A.V. Zamulin (Eds.), Proc. 5th Int. Conf. on Perspectives of System Informatics, PSI'03, in: Springer LNCS vol. 2890, Novosibirsk, Russia, 2003, pp. 192-206
  • 28
    • 24644460616 scopus 로고    scopus 로고
    • C. Piazza, E. Pivato, S. Rossi, CoPS - Checker of Persistent Security, in: K. Jensen, A. Podelski (Eds.), Tools and Algorithms for the Construction and Analysis of Systems, 10th Int. Conf., TACAS'04, in: Springer LNCS, vol. 2988, Barcelona, Spain, 2004, pp. 144-152
  • 29
    • 0029232082 scopus 로고
    • CSP and determinism in security modelling
    • IEEE CS Press, Oakland, CA
    • Roscoe A.W. CSP and determinism in security modelling. Proc. IEEE Symp. on Security and Privacy, SSP'95 (1995), IEEE CS Press, Oakland, CA 114-127
    • (1995) Proc. IEEE Symp. on Security and Privacy, SSP'95 , pp. 114-127
    • Roscoe, A.W.1
  • 31
    • 84955567248 scopus 로고    scopus 로고
    • D. Sangiorgi, R. Milner, The problem of weak bisimulation up to, in: R. Cleaveland (Ed.), Proc. 3rd Int. Conf. on Concurrency Theory, CONCUR'92, in: Springer LNCS, vol. 630, Stony Brook, NY, 1992, pp. 32-46


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.