메뉴 건너뛰기




Volumn 42, Issue 1, 2007, Pages 225-235

Assessing security threats of looping constructs

Author keywords

Information theory; Language semantics; Security

Indexed keywords

CLASSIFICATION (OF INFORMATION); INFORMATION DISSEMINATION; INFORMATION THEORY; MATHEMATICAL MODELS; SEMANTICS;

EID: 33846535380     PISSN: 15232867     EISSN: None     Source Type: Journal    
DOI: 10.1145/1190215.1190251     Document Type: Conference Paper
Times cited : (56)

References (27)
  • 1
    • 0003400251 scopus 로고    scopus 로고
    • Secure computer systems: Unified exposition and Multics interpretation
    • Technical Report MTR-2997, MTTRE Corp
    • D.Bell and L. LaPadula, "Secure computer systems: Unified exposition and Multics interpretation", Technical Report MTR-2997, MTTRE Corp, 1997.
    • (1997)
    • Bell, D.1    LaPadula, L.2
  • 7
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • May
    • D. E. R. Denning, "A Lattice Model of Secure Information Flow", Communications of the ACM, volume 19, number 5, May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5
    • Denning, D.E.R.1
  • 11
    • 0020299523 scopus 로고
    • Security Policies and Security Models
    • IEEE Computer Society Press
    • J. Goguen and J. Meseguer, "Security Policies and Security Models", IEEE Symposium on Security and Privacy, pages 11-20, IEEE Computer Society Press, 1982.
    • (1982) IEEE Symposium on Security and Privacy , pp. 11-20
    • Goguen, J.1    Meseguer, J.2
  • 12
    • 0032047481 scopus 로고    scopus 로고
    • A Logical Approach to Multilevel Security of Probabilistic Systems
    • J. W. Gray III and P. F. Syverson, "A Logical Approach to Multilevel Security of Probabilistic Systems", Distributed Computing, volume 11, number 2, 1998, pages 73-90.
    • (1998) Distributed Computing , vol.11 , Issue.2 , pp. 73-90
    • Gray III, J.W.1    Syverson, P.F.2
  • 13
    • 0026157130 scopus 로고
    • Toward a Mathematical Foundation for Information Flow Security
    • Oakland, CA, May
    • W. Gray, III, James, "Toward a Mathematical Foundation for Information Flow Security", Proc. 1991 IEEE Symposium on Security and Privacy, Oakland, CA, May1991, pages 21-34.
    • (1991) Proc. 1991 IEEE Symposium on Security and Privacy , pp. 21-34
    • Gray III, W.1    James2
  • 14
    • 33846479311 scopus 로고    scopus 로고
    • S. Isthiaq and P.W. O'Hearn, BI as an assertion language for mutable data structures, pages = 14-26, 28th POPL London 2001.
    • S. Isthiaq and P.W. O'Hearn, "BI as an assertion language for mutable data structures", pages = "14-26", 28th POPL London 2001.
  • 21
    • 0012721213 scopus 로고    scopus 로고
    • LICS'02
    • Invited Paper
    • J. Reynolds, "Separation logic: a logic for shared mutable data structures", Invited Paper, LICS'02, 2002.
    • (2002)
    • Reynolds, J.1
  • 23
    • 84940644968 scopus 로고    scopus 로고
    • C. Shannon, A mathematical theory of communication, The Bell System Technical Journal, 27, July and October, 1948, pages 379-423 and 623-656.
    • C. Shannon, "A mathematical theory of communication", The Bell System Technical Journal, volume 27, July and October, 1948, pages 379-423 and 623-656.
  • 24
    • 84956989228 scopus 로고    scopus 로고
    • A Type-Based Approach to Program Security
    • Proceedings of TAPSOFT '97 Colloquium on Formal Approaches in Software Engineering, April
    • D. Volpano and G. Smith, "A Type-Based Approach to Program Security", Proceedings of TAPSOFT '97 (Colloquium on Formal Approaches in Software Engineering), April 1997, Lecture Notes in Computer Science, number 1214, pages 607-621.
    • (1997) Lecture Notes in Computer Science , Issue.1214 , pp. 607-621
    • Volpano, D.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.