메뉴 건너뛰기




Volumn 168, Issue SPEC. ISS., 2007, Pages 61-75

Algorithmic Verification of Noninterference Properties

Author keywords

complexity; heuristics; model checking; noninterference

Indexed keywords

FINITE AUTOMATA; HEURISTIC METHODS; MATHEMATICAL MODELS; OPTIMIZATION; PROBLEM SOLVING; SIGNAL INTERFERENCE;

EID: 33846606100     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2006.11.002     Document Type: Article
Times cited : (42)

References (30)
  • 2
    • 4944265699 scopus 로고    scopus 로고
    • Barthe, G., P.R. D'Argenio and T. Rezk, Secure Information Flow by Self-Composition, in: 17th IEEE Computer Security Foundation Workshop (2004), pp. 100-114
  • 3
    • 84886601007 scopus 로고    scopus 로고
    • Bevier, W.R. and W.D. Young, A State-Based Approach to Noninterference, in: Proc. 7th Computer Security Foundations Workshop, 1994, pp. 11-21
  • 4
    • 35248852380 scopus 로고    scopus 로고
    • Bossi, A., R. Focardi, C. Piazza and S. Rossi, Bisimulation and Unwinding for Verifying Possibilistic Security Properties, in: Proc. of Int. Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI'03), 2003
  • 5
    • 0022769976 scopus 로고
    • Graph-Based Algorithms for Boolean Function Manipulation
    • Bryant R.E. Graph-Based Algorithms for Boolean Function Manipulation. IEEE Transactions on Computers C-35 (1986) 677-691
    • (1986) IEEE Transactions on Computers , vol.C-35 , pp. 677-691
    • Bryant, R.E.1
  • 6
    • 33846560754 scopus 로고    scopus 로고
    • Darvas, A., R. Hähnle and D. Sands, A Theorem Proving Approach to Analysis of Secure Information Flow, in: Workshop on Issues in the Theory of Security, (WITS'03), 2003
  • 7
    • 84958624280 scopus 로고    scopus 로고
    • Fisler, K. and M.Y. Vardi, Bisimulation and Model Checking, in: Conference on Correct Hardware Design and Verification Methods (CHARME'99), 1999, pp. 338-341
  • 8
    • 84974776068 scopus 로고
    • A Classification of Security Properties for Process Algebras
    • IOS Press
    • Focardi R., and Gorrieri R. A Classification of Security Properties for Process Algebras. Journal of Computer Security 1 (1995) 5-33 IOS Press
    • (1995) Journal of Computer Security , vol.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 9
    • 33846649183 scopus 로고    scopus 로고
    • Focardi, R. and R. Gorrieri, The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties, Technical Report UBLCS-96-14, Università di Bologna (1996)
  • 10
    • 84876687849 scopus 로고    scopus 로고
    • Focardi, R., C. Piazza and S. Rossi, Proofs Methods for Bisimulation Based Information Flow Security, in: Proc. of Int. Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI'02), 2002, pp. 16-31
  • 12
    • 0020299523 scopus 로고    scopus 로고
    • Goguen, J. and J. Meseguer, Security Policies and Security Models, in: IEEE Symp. on Security and Privacy, 1982, pp. 11-20
  • 13
    • 0021177508 scopus 로고    scopus 로고
    • Goguen, J. and J. Meseguer, Unwinding and Inference Control, in: IEEE Symp. on Security and Privacy, 1984
  • 14
    • 33846618335 scopus 로고    scopus 로고
    • Greve, D., M. Wilding and W. van Fleet, A Separation Kernel Formal Security Policy, in: ACL2 Workshop, 2003
  • 15
    • 33846627853 scopus 로고    scopus 로고
    • Johnson, D.M. and F.J. Thayer, Security and the composition of machines, in: Proc. IEEE Computer Security Foundations Workshop, 1988, pp. 72-89
  • 16
    • 0020977953 scopus 로고    scopus 로고
    • Kanellakis, P.C. and S.A. Smolka, CCS Expressions, Finite State Processes, and Three Problems of Equivalence, in: Proc. 2nd Annual ACM Symposium on Principles of Distributed Computing, New York, NY, 1983, pp. 228-240
  • 17
    • 0023231848 scopus 로고    scopus 로고
    • McCullough, D., Specifications for Multi-Level Security and a Hook-Up Property, in: Proc. IEEE Symp. on Security and Privacy, 1987, pp. 161-166
  • 18
    • 0023829319 scopus 로고    scopus 로고
    • McCullough, D., Noninterference and the composability of security properties, in: Proc. IEEE Symp. on Security and Privacy, 1988, pp. 177-186
  • 20
    • 0028058408 scopus 로고    scopus 로고
    • McLean, J., A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions, in: Proc. IEEE Symp. on Security and Privacy, 1994, pp. 79-93
  • 21
    • 35048854255 scopus 로고    scopus 로고
    • Information flow control revisited: Noninfluence = Noninterference + Nonleakage
    • Computer Security - ESORICS'04
    • Oheimb D.v. Information flow control revisited: Noninfluence = Noninterference + Nonleakage. Computer Security - ESORICS'04. LNCS 3193 (2004) 225-243
    • (2004) LNCS , vol.3193 , pp. 225-243
    • Oheimb, D.v.1
  • 22
    • 0023566630 scopus 로고
    • Three Partition Refinement Algorithms
    • Paige R., and Tarjan R. Three Partition Refinement Algorithms. SIAM Journal of Computing 16 (1987) 973-989
    • (1987) SIAM Journal of Computing , vol.16 , pp. 973-989
    • Paige, R.1    Tarjan, R.2
  • 23
    • 0029232082 scopus 로고    scopus 로고
    • Roscoe, A., CSP and determinism in security modelling, in: Proc. IEEE Symp. on Security and Privacy, 1995, pp. 114-221
  • 24
    • 0020273088 scopus 로고    scopus 로고
    • Rushby, J., Proof of Separability - a Verification Technique for a Class of Security Kernels, in: Proc. 5th International Symposium on Programming, Turin, Italy, 1982, pp. 352-367
  • 25
    • 33846570060 scopus 로고    scopus 로고
    • Rushby, J., Noninterference, Transitivity, and Channel-Control Security Policies, Technical report, SRI international (1992). URL http://www.csl.sri.com/papers/csl-92-2/
  • 26
    • 33846578356 scopus 로고    scopus 로고
    • Sutherland, D., A model of information, in: Proc. 9th National Computer Security Conference, 1986, pp. 175-183
  • 27
    • 84972541021 scopus 로고
    • A lattice-theoretical fixpoint theorem and its applications
    • Tarski A. A lattice-theoretical fixpoint theorem and its applications. Pacific J. Math. (1955) 285-309
    • (1955) Pacific J. Math. , pp. 285-309
    • Tarski, A.1
  • 28
    • 33846606933 scopus 로고    scopus 로고
    • van der Meyden, R. and C. Zhang, A comparison of semantic models for noninterference, in: 4th International Workshop in Formal Aspects in Security and Trust (FAST'06), 2006, to appear, available at http://www.cse.unsw.edu.au/~czhang/fast.ps
  • 29
    • 0025135716 scopus 로고    scopus 로고
    • Wittbold, J.T. and D.M. Johnson, Information flow in nondeterministic systems, in: Proc. IEEE Symp. on Security and Privacy, 1990, pp. 144-161
  • 30
    • 0030672129 scopus 로고    scopus 로고
    • Zakinthinos, A. and E. Lee, A general theory of security properties, in: Proc. IEEE Symp. on Security and Privacy, 1997, pp. 94-102


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.