메뉴 건너뛰기




Volumn 4189 LNCS, Issue , 2006, Pages 225-242

A formal framework for confidentiality-preserving refinement

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; FUNCTIONS; MATHEMATICAL MODELS; PROBABILISTIC LOGICS; PROCESS CONTROL;

EID: 33750235645     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11863908_15     Document Type: Conference Paper
Times cited : (8)

References (32)
  • 4
    • 84958060420 scopus 로고    scopus 로고
    • Météor: A successful application of B in a large project
    • J. Wing, J. Woodcock, and J. Davies, editors, FM'99 - Formal Methods. Springer-Verlag
    • P. Behm, P. Benoit, A. Faivre, and J.-M. Meynadier. Météor: A successful application of B in a large project. In J. Wing, J. Woodcock, and J. Davies, editors, FM'99 - Formal Methods, volume I of LNCS 1708, pages 369-387. Springer-Verlag, 1999.
    • (1999) LNCS 1708 , vol.1 , pp. 369-387
    • Behm, P.1    Benoit, P.2    Faivre, A.3    Meynadier, J.-M.4
  • 6
    • 34250190790 scopus 로고    scopus 로고
    • On probabilistic computation tree logic
    • C. Baier, B. R. Haverkort, H. Hermanns, J.-P. Katoen, and M. Siegle, editors, LNCS 2925. Springer-Verlag
    • F. Ciesinski and M. Größer. On probabilistic computation tree logic. In C. Baier, B. R. Haverkort, H. Hermanns, J.-P. Katoen, and M. Siegle, editors, Validation of Stochastic Systems: A Guide to Current Research, LNCS 2925, pages 147-188. Springer-Verlag, 2004.
    • (2004) Validation of Stochastic Systems: A Guide to Current Research , pp. 147-188
    • Ciesinski, F.1    Größer, M.2
  • 9
    • 84974759639 scopus 로고
    • Toward a mathematical foundation for information flow security
    • J. W. Gray, III. Toward a mathematical foundation for information flow security. Journal of Computer Security, pages 255-294, 1992.
    • (1992) Journal of Computer Security , pp. 255-294
    • Gray III, J.W.1
  • 11
    • 0015482118 scopus 로고
    • Proof of correctness of data representations
    • C. A. R. Hoare. Proof of correctness of data representations. Acta Informatica, 1:271-281, 1972.
    • (1972) Acta Informatica , vol.1 , pp. 271-281
    • Hoare, C.A.R.1
  • 12
    • 0024663847 scopus 로고
    • On the derivation of secure components
    • IEEE Press
    • J.Jacob. On the derivation of secure components. In IEEE Symposium on Security and Privacy, pages 242-247. IEEE Press, 1989.
    • (1989) IEEE Symposium on Security and Privacy , pp. 242-247
    • Jacob, J.1
  • 14
    • 84881150179 scopus 로고    scopus 로고
    • Secrecy-preserving refinement
    • J. N. Oliveira and P. Zave, editors, LNCS 2021. Springer-Verlag
    • J. Jürjens. Secrecy-preserving refinement. In J. N. Oliveira and P. Zave, editors, FME 2001: Formal Methods for Increasing Software Productivity, LNCS 2021, pages 135-152. Springer-Verlag, 2001.
    • (2001) FME 2001: Formal Methods for Increasing Software Productivity , pp. 135-152
    • Jürjens, J.1
  • 18
    • 0034836335 scopus 로고    scopus 로고
    • Preserving information flow properties under refinement
    • IEEE Computer Society Press
    • H. Mantel. Preserving information flow properties under refinement. In IEEE Symposium on Security and Privacy, pages 78-91. IEEE Computer Society Press, 2001.
    • (2001) IEEE Symposium on Security and Privacy , pp. 78-91
    • Mantel, H.1
  • 20
    • 0002426876 scopus 로고    scopus 로고
    • A general theory of composition for a class of "possibilistic" properties
    • J. McLean. A general theory of composition for a class of "possibilistic" properties. IEEE Transactions on Software Engineering, 22(1):53-67, 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 53-67
    • McLean, J.1
  • 21
    • 84945713135 scopus 로고
    • Applying "design by contract"
    • October
    • B. Meyer. Applying "design by contract". IEEE Computer, pages 40-51, October 1992.
    • (1992) IEEE Computer , pp. 40-51
    • Meyer, B.1
  • 23
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • IEEE Computer Society
    • B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In IEEE Symposium on Security and Privacy, pages 184-201. IEEE Computer Society, 2001.
    • (2001) IEEE Symposium on Security and Privacy , pp. 184-201
    • Pfitzmann, B.1    Waidner, M.2
  • 24
    • 0029232082 scopus 로고
    • CSP and determinism in security modelling
    • IEEE Computer Society Press
    • A. W. Roscoe. CSP and determinism in security modelling. In Proc. IEEE Symposium on Security and Privacy, pages 114-127. IEEE Computer Society Press, 1995.
    • (1995) Proc. IEEE Symposium on Security and Privacy , pp. 114-127
    • Roscoe, A.W.1
  • 28
    • 84874143629 scopus 로고    scopus 로고
    • Probabilistic confidentiality properties based on indistinguishability
    • H. Federrath, editor, Lecture Notes in Informatics. Gesellschaft für Informatik
    • T. Santen. Probabilistic confidentiality properties based on indistinguishability. In H. Federrath, editor, Proc. Sicherheit 2005 - Schutz und Zuverlässigkeit, Lecture Notes in Informatics, pages 113-124. Gesellschaft für Informatik, 2005.
    • (2005) Proc. Sicherheit 2005 - Schutz und Zuverlässigkeit , pp. 113-124
    • Santen, T.1
  • 29
    • 84957012794 scopus 로고    scopus 로고
    • Confidentiality-preserving refinement is compositional - Sometimes
    • D. Gollmann, G. Karjoth, and M. Waidner, editors, LNCS 2502. Springer-Verlag
    • T. Santen, M. Heisel, and A. Pfitzmann. Confidentiality-preserving refinement is compositional - sometimes. In D. Gollmann, G. Karjoth, and M. Waidner, editors, Computer Security - ESORICS 2002, LNCS 2502, pages 194-211. Springer-Verlag, 2002.
    • (2002) Computer Security - ESORICS 2002 , pp. 194-211
    • Santen, T.1    Heisel, M.2    Pfitzmann, A.3
  • 30
    • 0001609136 scopus 로고
    • Probabilistic simulations for probabilistic processes
    • R. Segala and N. Lynch. Probabilistic simulations for probabilistic processes. Nordic Journal of Computing, 2(2):250-273, 1995.
    • (1995) Nordic Journal of Computing , vol.2 , Issue.2 , pp. 250-273
    • Segala, R.1    Lynch, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.