메뉴 건너뛰기




Volumn 168, Issue SPEC. ISS., 2007, Pages 29-43

An Approach for the Specification, Verification and Synthesis of Secure Systems

Author keywords

open system analysis; partial model checking; secure systems analysis; synthesis of controller operators

Indexed keywords

CONTROLLER OPERATORS; OPEN SYSTEM ANALYSIS; PARTIAL MODEL CHECKING; SECURE SYSTEMS ANALYSIS;

EID: 33846587542     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2006.12.003     Document Type: Article
Times cited : (24)

References (23)
  • 1
    • 33846620232 scopus 로고    scopus 로고
    • Andersen, H., "Verification of Temporal Properties of Concurrent Systems," Ph.D. thesis, Department of Computer Science, Aarhus University, Denmark (1993)
  • 3
    • 33846648834 scopus 로고    scopus 로고
    • Bauer, L., J. Ligatti and D. Walker, More Enforceable Security Policies, in: I. Cervesato, editor, Foundations of Computer Security: Proceedings of the FLoC'02 workshop on Foundations of Computer Security (2002), pp. 95-104
  • 6
    • 84974776068 scopus 로고
    • A Classification of Security Properties for Process Algebras
    • Focardi R., and Gorrieri R. A Classification of Security Properties for Process Algebras. Journal of Computer Security 3 (1994/1995) 5-33
    • (1994) Journal of Computer Security , vol.3 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 7
    • 35048815468 scopus 로고    scopus 로고
    • Classification of Security Properties - Part II: Network Security
    • Tutorial Lectures of the International School on Foundations of Security Analysis and Design. (FOSAD'02)
    • Focardi R., Gorrieri R., and Martinelli F. Classification of Security Properties - Part II: Network Security. Tutorial Lectures of the International School on Foundations of Security Analysis and Design. (FOSAD'02). Lecture Notes in Computer Science 2946 (2004) 139-185
    • (2004) Lecture Notes in Computer Science , vol.2946 , pp. 139-185
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 8
    • 84958046259 scopus 로고    scopus 로고
    • A Uniform Approach for the Definition of Security Properties
    • FM'99: Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I
    • Focardi R., and Martinelli F. A Uniform Approach for the Definition of Security Properties. FM'99: Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I. Lecture Notes in Computer Science 1708 (1999) 794-813
    • (1999) Lecture Notes in Computer Science , vol.1708 , pp. 794-813
    • Focardi, R.1    Martinelli, F.2
  • 10
    • 0020299523 scopus 로고    scopus 로고
    • Goguen, J.A. and J. Meseguer, Security Policy and Security Models, in: Proceedings of the 1982 Symposium on Security and Privacy (1982), pp. 11-20
  • 12
    • 84957667659 scopus 로고    scopus 로고
    • Module checking
    • Proceedings of the Eighth International Conference on Computer Aided Verification. Alur R., and Henzinger T.A. (Eds)
    • Kupferman O., and Vardi M.Y. Module checking. In: Alur R., and Henzinger T.A. (Eds). Proceedings of the Eighth International Conference on Computer Aided Verification. Lecture Notes in Computer Science 1102 (1996) 75-86
    • (1996) Lecture Notes in Computer Science , vol.1102 , pp. 75-86
    • Kupferman, O.1    Vardi, M.Y.2
  • 13
    • 84994742813 scopus 로고    scopus 로고
    • Lowe, G., A Hierarchy of Authentication Specification, in: Proceedings of the 10th Computer Security Foundation Workshop (1997), pp. 31-43
  • 14
    • 33846566403 scopus 로고    scopus 로고
    • Martinelli, F., "Formal Methods for the Analysis of Open Systems with Applications to Security Properties," Ph.D. thesis, University of Siena (1998)
  • 15
    • 33846608772 scopus 로고    scopus 로고
    • Martinelli, F., Module Checking through Partial Model Checking, Technical Report 2002-TR-06, IIT-CNR (2002)
  • 16
    • 0037209815 scopus 로고    scopus 로고
    • Analysis of security protocols as open systems
    • Martinelli F. Analysis of security protocols as open systems. Theoretical Computer Science 290 (2003) 1057-1106
    • (2003) Theoretical Computer Science , vol.290 , pp. 1057-1106
    • Martinelli, F.1
  • 17
    • 33846581104 scopus 로고    scopus 로고
    • Martinelli, F. and I. Matteucci, Modeling Security Automata with process algebras and related results (2006), presented at the 6th International Workshop on Issues in the Theory of Security (WITS'06) - Informal proceedings
  • 18
    • 33846642724 scopus 로고    scopus 로고
    • Through modeling to Synthesis of Security Automata
    • Proceedings of the 2nd International Workshop on Security and Trust Management. (STM'06)
    • Martinelli F., and Matteucci I. Through modeling to Synthesis of Security Automata. Proceedings of the 2nd International Workshop on Security and Trust Management. (STM'06). Electronic Notes in Theoretical Computer Science (2006)
    • (2006) Electronic Notes in Theoretical Computer Science
    • Martinelli, F.1    Matteucci, I.2
  • 19
    • 33846604737 scopus 로고    scopus 로고
    • Automated synthesis of enforcing mechanisms for security properties in a timed setting
    • Proceedings of the Workshop on Information and Computer Security. (ICS'06)
    • Matteucci I. Automated synthesis of enforcing mechanisms for security properties in a timed setting. Proceedings of the Workshop on Information and Computer Security. (ICS'06). Electronic Notes in Theoretical Computer Science (2006)
    • (2006) Electronic Notes in Theoretical Computer Science
    • Matteucci, I.1
  • 23
    • 0024681890 scopus 로고
    • An automata theoretic procedure for the propositional μ-calculus
    • Street R.S., and Emerson E.A. An automata theoretic procedure for the propositional μ-calculus. Information and Computation 81 (1989) 249-264
    • (1989) Information and Computation , vol.81 , pp. 249-264
    • Street, R.S.1    Emerson, E.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.