메뉴 건너뛰기




Volumn 4189 LNCS, Issue , 2006, Pages 279-296

From coupling relations to mated invariants for checking information flow

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION (OF INFORMATION); COMPUTER SYSTEMS PROGRAMMING; INFORMATION DISSEMINATION; INVARIANCE; OBJECT ORIENTED PROGRAMMING;

EID: 33750232981     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11863908_18     Document Type: Conference Paper
Times cited : (43)

References (32)
  • 3
    • 33745220946 scopus 로고    scopus 로고
    • Ownership confinement ensures representation independence for object-oriented programs
    • Nov.
    • A. Banerjee and D. A. Naumann. Ownership confinement ensures representation independence for object-oriented programs. Journal of the ACM, 52(6):894-960, Nov. 2005.
    • (2005) Journal of the ACM , vol.52 , Issue.6 , pp. 894-960
    • Banerjee, A.1    Naumann, D.A.2
  • 4
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based access control for secure information flow
    • A. Banerjee and D. A. Naumann. Stack-based access control for secure information flow. Journal of Functional Programming, 15(2): 131-177, 2005.
    • (2005) Journal of Functional Programming , vol.15 , Issue.2 , pp. 131-177
    • Banerjee, A.1    Naumann, D.A.2
  • 6
    • 19044390891 scopus 로고    scopus 로고
    • The Spec# programming system: An overview
    • G. Barthe, L. Burdy, M. Huisman, J.-L. Lanet, and T. Muntean, editors, Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop (CASSIS 2004), Revised Selected Papers, Springer
    • M. Barnett, K. R. M. Leino, and W. Schulte. The Spec# programming system: An overview. In G. Barthe, L. Burdy, M. Huisman, J.-L. Lanet, and T. Muntean, editors, Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop (CASSIS 2004), Revised Selected Papers, volume 3362 of LNCS, pages 49-69. Springer, 2005.
    • (2005) LNCS , vol.3362 , pp. 49-69
    • Barnett, M.1    Leino, K.R.M.2    Schulte, W.3
  • 8
    • 29144532201 scopus 로고    scopus 로고
    • Non-interference for a JVM-like language
    • M. Fähndrich, editor, ACM Press
    • G. Barthe and T. Rezk. Non-interference for a JVM-like language. In M. Fähndrich, editor, Proceedings of TLDI'05, pages 103-112. ACM Press, 2005.
    • (2005) Proceedings of TLDI'05 , pp. 103-112
    • Barthe, G.1    Rezk, T.2
  • 9
    • 1442263162 scopus 로고    scopus 로고
    • Simple relational correctness proofs for static analyses and program transformations
    • N. Benton. Simple relational correctness proofs for static analyses and program transformations. In ACM Symposium on Principles of Programming Languages (POPL), pages 14-25, 2004.
    • (2004) ACM Symposium on Principles of Programming Languages (POPL) , pp. 14-25
    • Benton, N.1
  • 10
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • A. K. J. Richard A. DeMillo, David P. Dobkin and R. J. Lipton, editors, Academic Press
    • E. S. Cohen. Information transmission in sequential programs. In A. K. J. Richard A. DeMillo, David P. Dobkin and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 11
    • 24644445710 scopus 로고    scopus 로고
    • A theorem proving approach to analysis of secure information flow
    • D. Hutter and M. Ullmann, editors, Proc. 2nd International Conference on Security in Pervasive Computing, Springer
    • A. Darvas, R. Hähnle, and D. Sands. A theorem proving approach to analysis of secure information flow. In D. Hutter and M. Ullmann, editors, Proc. 2nd International Conference on Security in Pervasive Computing, volume 3450 of LNCS, pages 193-209. Springer, 2005.
    • (2005) LNCS , vol.3450 , pp. 193-209
    • Darvas, A.1    Hähnle, R.2    Sands, D.3
  • 16
    • 33750243650 scopus 로고
    • Data refinement and the tranform
    • M. Broy, editor, Springer, International Summer School at Marktoberdorf
    • D. Gries. Data refinement and the tranform. In M. Broy, editor, Program Design Calculi. Springer, 1993. International Summer School at Marktoberdorf.
    • (1993) Program Design Calculi
    • Gries, D.1
  • 18
    • 35048865734 scopus 로고    scopus 로고
    • Java program verification at Nijmegen: Developments and perspective
    • Technical Report NIII-R0318, Computing Science Institute, University of Nijmegen, 2003. In International Symposium on Software Security, Springer
    • B. Jacobs and E. Poll. Java program verification at Nijmegen: Developments and perspective. Technical Report NIII-R0318, Computing Science Institute, University of Nijmegen, 2003. In International Symposium on Software Security, volume 3233, of LNCS, pages 134-153. Springer, 2003.
    • (2003) LNCS , vol.3233 , pp. 134-153
    • Jacobs, B.1    Poll, E.2
  • 19
    • 0142245536 scopus 로고    scopus 로고
    • How the design of JML accommodates both runtime assertion checking and formal verification
    • F. S. de Boer, M. M. Bonsangue, S. Graf, and W.-P. de Roever, editors, Formal Methods for Components and Objects (FMCO 2002), Springer
    • G. T. Leavens, Y. Cheon, C. Clifton, C. Ruby, and D. R. Cok. How the design of JML accommodates both runtime assertion checking and formal verification. In F. S. de Boer, M. M. Bonsangue, S. Graf, and W.-P. de Roever, editors, Formal Methods for Components and Objects (FMCO 2002), volume 2852 of LNCS, pages 262-284. Springer, 2003.
    • (2003) LNCS , vol.2852 , pp. 262-284
    • Leavens, G.T.1    Cheon, Y.2    Clifton, C.3    Ruby, C.4    Cok, D.R.5
  • 20
    • 27744588162 scopus 로고    scopus 로고
    • Modular invariants for layered object structures
    • Department of Computer Science, ETH Zurich
    • P. Müller, A. Poetzsch-Heffter, and G. T. Leavens. Modular invariants for layered object structures. Technical Report 424, Department of Computer Science, ETH Zurich, 2004.
    • (2004) Technical Report , vol.424
    • Müller, P.1    Poetzsch-Heffter, A.2    Leavens, G.T.3
  • 22
    • 26844529721 scopus 로고    scopus 로고
    • Verifying a secure information flow analyzer
    • J. Hurd and T. Melham, editors, 18th International Conference on Theorem Proving in Higher Order Logics TPHOLS, Springer
    • D. A. Naumann. Verifying a secure information flow analyzer. In J. Hurd and T. Melham, editors, 18th International Conference on Theorem Proving in Higher Order Logics TPHOLS, volume 3603 of LNCS pages 211-226. Springer, 2005.
    • (2005) LNCS , vol.3603 , pp. 211-226
    • Naumann, D.A.1
  • 23
    • 33750236160 scopus 로고    scopus 로고
    • Towards imperative modules: Reasoning about invariants and sharing of mutable state
    • To appear in
    • D. A. Naumann and M. Barnett. Towards imperative modules: Reasoning about invariants and sharing of mutable state. To appear in Theoretical Computer Science, 2006.
    • (2006) Theoretical Computer Science
    • Naumann, D.A.1    Barnett, M.2
  • 26
    • 0036051192 scopus 로고    scopus 로고
    • Separation logic: A logic for shared mutable data structures
    • J. C. Reynolds. Separation logic: a logic for shared mutable data structures. In IEEE Logic in Computer Science (LICS), pages 55-74, 2002.
    • (2002) IEEE Logic in Computer Science (LICS) , pp. 55-74
    • Reynolds, J.C.1
  • 28
    • 0035276729 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher-order and Symbolic Computation, 14(1):59-91, 2001.
    • (2001) Higher-order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 30
    • 33646037706 scopus 로고    scopus 로고
    • Secure information flow as a safety problem
    • 12th International Static Analysis Symposium (SAS), Springer
    • T. Terauchi and A. Aiken. Secure information flow as a safety problem. In 12th International Static Analysis Symposium (SAS), volume 3672 of LNCS, pages 352-367. Springer, 2005.
    • (2005) LNCS , vol.3672 , pp. 352-367
    • Terauchi, T.1    Aiken, A.2
  • 31
    • 84956989228 scopus 로고    scopus 로고
    • A type-based approach to program security
    • Proceedings of TAPSOFT'97, Springer
    • D. Volpano and G. Smith. A type-based approach to program security. In Proceedings of TAPSOFT'97, volume 1214 in LNCS, pages 607-621. Springer, 1997.
    • (1997) LNCS , vol.1214 , pp. 607-621
    • Volpano, D.1    Smith, G.2
  • 32
    • 33750259675 scopus 로고    scopus 로고
    • Relational separation logic
    • To appear
    • H. Yang. Relational separation logic. Theoretical Comput. Sci., 2004. To appear.
    • (2004) Theoretical Comput. Sci.
    • Yang, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.