메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 177-189

Securing interaction between threads and the scheduler

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER SOFTWARE; CRYPTOGRAPHY; DATA PRIVACY; INFORMATION DISSEMINATION; SEMANTICS;

EID: 33947645959     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2006.29     Document Type: Conference Paper
Times cited : (47)

References (34)
  • 2
    • 84879520825 scopus 로고    scopus 로고
    • G. Boudol and I. Castellani. Noninterference for concurrent programs. In Proc. ICALP'01, 2076 of LAO, pages 382-395. Springer-Verlag, July 2001.
    • G. Boudol and I. Castellani. Noninterference for concurrent programs. In Proc. ICALP'01, volume 2076 of LAO, pages 382-395. Springer-Verlag, July 2001.
  • 3
    • 0037014243 scopus 로고    scopus 로고
    • Non-interference for concurrent programs and thread systems
    • June
    • G. Boudol and I. Castellani. Non-interference for concurrent programs and thread systems. Theoretical Computer Science, 281(1): 109-130, June 2002.
    • (2002) Theoretical Computer Science , vol.281 , Issue.1 , pp. 109-130
    • Boudol, G.1    Castellani, I.2
  • 4
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Academic Press
    • E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 5
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 8
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (part I: Information flow)
    • R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, of, Springer-Verlag
    • R. Focardi and R. Gorrieri. Classification of security properties (part I: Information flow). In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 331-396. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 11
    • 84947269249 scopus 로고    scopus 로고
    • Secure information flow as typed process behaviour
    • Proc. European Symp. on Programming, of, Springer-Verlag
    • K. Honda, V. Vasconcelos, and N. Yoshida. Secure information flow as typed process behaviour. In Proc. European Symp. on Programming, volume 1782 of LNCS, pages 180-199. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1782 , pp. 180-199
    • Honda, K.1    Vasconcelos, V.2    Yoshida, N.3
  • 14
    • 33947663590 scopus 로고    scopus 로고
    • Networking, user experience, and threads
    • J. Knudsen. Networking, user experience, and threads. Sun Technical Articles and Tips http://developers.sun.com/techtopics/ mobility/midp/articles/ threading/, 2002.
    • (2002) Sun Technical Articles and Tips
    • Knudsen, J.1
  • 15
    • 33947668912 scopus 로고    scopus 로고
    • Preventing screen lockups of blocking operations
    • Q. H. Mahmoud. Preventing screen lockups of blocking operations. Sun Technical Articles and Tips http://developers.sun.com/techtopics/ mobility/midp/ttips/screenlock/, 2004.
    • (2004) Sun Technical Articles and Tips
    • Mahmoud, Q.H.1
  • 16
    • 0023231848 scopus 로고
    • Specifications for multi-level security and hook-up property
    • Apr
    • D. McCullough. Specifications for multi-level security and hook-up property. In Proc. IEEE Symp. on Security and Privacy, pages 161-166, Apr. 1987.
    • (1987) Proc. IEEE Symp. on Security and Privacy , pp. 161-166
    • McCullough, D.1
  • 17
    • 0025211594 scopus 로고
    • The specification and modeling of computer security
    • Jan
    • J. McLean. The specification and modeling of computer security. Computer, 23(1):9-16, Jan. 1990.
    • (1990) Computer , vol.23 , Issue.1 , pp. 9-16
    • McLean, J.1
  • 18
    • 33947613648 scopus 로고    scopus 로고
    • A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001-2006.
    • A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001-2006.
  • 19
    • 84948737028 scopus 로고    scopus 로고
    • A simple view of type-secure information flow in the pi-calculus
    • June
    • F. Pottier. A simple view of type-secure information flow in the pi-calculus. In Proc. IEEE Computer Security Foundations Workshop, pages 320-330, June 2002.
    • (2002) Proc. IEEE Computer Security Foundations Workshop , pp. 320-330
    • Pottier, F.1
  • 21
    • 33947697220 scopus 로고    scopus 로고
    • Security for multithreaded programs under cooperative scheduling
    • Proc. Andrei Ershov International. Conference on Perspectives of System Informatics, Springer-Verlag, June
    • A. Russo and A. Sabelfeld. Security for multithreaded programs under cooperative scheduling. In Proc. Andrei Ershov International. Conference on Perspectives of System Informatics, LNCS. Springer-Verlag, June 2006.
    • (2006) LNCS
    • Russo, A.1    Sabelfeld, A.2
  • 22
    • 0012886288 scopus 로고    scopus 로고
    • Mathematical models of computer security -tutorial lectures
    • R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, of, Springer-Verlag
    • P. Ryan. Mathematical models of computer security -tutorial lectures. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 1-62. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2171 , pp. 1-62
    • Ryan, P.1
  • 23
    • 84885715358 scopus 로고    scopus 로고
    • The impact of synchronisation on secure information flow in concurrent programs
    • Proc. Andrei Ershov International Conference on Perspectives of System Informatics, of, Springer-Verlag, July
    • A. Sabelfeld. The impact of synchronisation on secure information flow in concurrent programs. In Proc. Andrei Ershov International Conference on Perspectives of System Informatics, volume 2244 of LNCS, pages 225-239. Springer-Verlag, July 2001.
    • (2001) LNCS , vol.2244 , pp. 225-239
    • Sabelfeld, A.1
  • 24
    • 84958755151 scopus 로고    scopus 로고
    • Static confidentiality enforcement for distributed programs
    • Proc. Symp. on Static Analysis, of, Springer-Verlag, Sept
    • A. Sabelfeld and H. Mantel. Static confidentiality enforcement for distributed programs. In Proc. Symp. on Static Analysis, volume 2477 of LNCS, pages 376-394. Springer-Verlag, Sept. 2002.
    • (2002) LNCS , vol.2477 , pp. 376-394
    • Sabelfeld, A.1    Mantel, H.2
  • 27
    • 33947690755 scopus 로고    scopus 로고
    • V. Simonet. The Flow Caml system. Software release. Located at http://cristal.inria.fr/~simonet /soft/flowcaml/, July 2003.
    • V. Simonet. The Flow Caml system. Software release. Located at http://cristal.inria.fr/~simonet /soft/flowcaml/, July 2003.
  • 29
    • 18544362925 scopus 로고    scopus 로고
    • Probabilistic noninterference through weak probabilistic bisimulation
    • G. Smith. Probabilistic noninterference through weak probabilistic bisimulation. In Proc. IEEE Computer Security Foundations Workshop, pages 3-13, 2003.
    • (2003) Proc. IEEE Computer Security Foundations Workshop , pp. 3-13
    • Smith, G.1
  • 32
    • 0033330060 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language
    • Nov
    • D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. J. Computer Security, 7(2-3):231-253, Nov. 1999.
    • (1999) J. Computer Security , vol.7 , Issue.2-3 , pp. 231-253
    • Volpano, D.1    Smith, G.2
  • 33
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3): 167-187, 1996.
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.