메뉴 건너뛰기




Volumn 2946, Issue , 2004, Pages 207-265

Security for mobility

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; POLYNOMIAL APPROXIMATION; SEMANTICS; STATIC ANALYSIS;

EID: 34247854302     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24631-2_6     Document Type: Article
Times cited : (15)

References (40)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols - The Spi calculus
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols - The Spi calculus. Information and Computation, 148(1):1-70, 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 2
    • 0033226029 scopus 로고    scopus 로고
    • Introduction to set constraint-based program analysis
    • A. Aiken. Introduction to set constraint-based program analysis. Science of Computer Programming (SCP), 35(2):79-111, 1999.
    • (1999) Science of Computer Programming (SCP) , vol.35 , Issue.2 , pp. 79-111
    • Aiken, A.1
  • 6
    • 35048820727 scopus 로고    scopus 로고
    • Control flow analysis for information flow security in Mobile Ambients
    • Technical Report IMM-TR-2001-14. Technical University of Denmark
    • C. Braghin, A. Cortesi, and R. Focardi. Control flow analysis for information flow security in Mobile Ambients. In Proceedings of NordSec 2001. Technical Report IMM-TR-2001-14. Technical University of Denmark, 2001.
    • (2001) Proceedings of NordSec 2001
    • Braghin, C.1    Cortesi, A.2    Focardi, R.3
  • 8
    • 84978997669 scopus 로고    scopus 로고
    • Boxed Ambients
    • Theoretical Aspects in Computer Science (TACS 2001), Springer
    • M. Bugliesi, G. Castagna, and S. Crafa. Boxed Ambients. In Theoretical Aspects in Computer Science (TACS 2001), volume 2215 of Lecture Notes in Computer Science, pages 37-63. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2215 , pp. 37-63
    • Bugliesi, M.1    Castagna, G.2    Crafa, S.3
  • 9
    • 84944032874 scopus 로고    scopus 로고
    • Reasoning about security in Mobile Ambients
    • CONCUR 2001 - Concurrency Theory, Springer
    • M. Bugliesi, G. Castagna, and S. Crafa. Reasoning about security in Mobile Ambients. In CONCUR 2001 - Concurrency Theory, volume 2154 of Lecture Notes in Computer Science, pages 102-120. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2154 , pp. 102-120
    • Bugliesi, M.1    Castagna, G.2    Crafa, S.3
  • 11
    • 84887502600 scopus 로고    scopus 로고
    • Mobility types for Mobile Ambients
    • Automata, Languages, and Programming. 26th International Colloquium, ICALP 1999, Springer
    • L. Cardelli, G. Ghelli, and A. D. Gordon. Mobility types for Mobile Ambients. In Automata, Languages, and Programming. 26th International Colloquium, ICALP 1999, volume 1644 of Lecture Notes in Computer Science, pages 230-239. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1644 , pp. 230-239
    • Cardelli, L.1    Ghelli, G.2    Gordon, A.D.3
  • 12
    • 84879087677 scopus 로고    scopus 로고
    • Ambient groups and mobility types
    • Theoretical Computer Science. International Conference IFIP TCS 2000, Springer
    • L. Cardelli, G. Ghelli, and A. D. Gordon. Ambient groups and mobility types. In Theoretical Computer Science. International Conference IFIP TCS 2000, volume 1872 of Lecture Notes in Computer Science, pages 333-347. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1872 , pp. 333-347
    • Cardelli, L.1    Ghelli, G.2    Gordon, A.D.3
  • 13
    • 84947919695 scopus 로고    scopus 로고
    • Mobile Ambients
    • Foundations of Software Science and Computation Structures (FoSSaCS 1998), Springer
    • L. Cardelli and A. D. Gordon. Mobile Ambients. In Foundations of Software Science and Computation Structures (FoSSaCS 1998), volume 1378 of Lecture Notes in Computer Science, pages 140-155. Springer, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1378 , pp. 140-155
    • Cardelli, L.1    Gordon, A.D.2
  • 17
    • 84957057595 scopus 로고    scopus 로고
    • Finite-control Mobile Ambients
    • Programming Languages and Systems. 11th European Symposium on Programming (ESOP 2001), Springer
    • W. Charatonik, A. D. Gordon, and J.-M. Talbot. Finite-control Mobile Ambients. In Programming Languages and Systems. 11th European Symposium on Programming (ESOP 2001), volume 2305 of Lecture Notes in Computer Science. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2305
    • Charatonik, W.1    Gordon, A.D.2    Talbot, J.-M.3
  • 21
    • 12444299406 scopus 로고    scopus 로고
    • Information flow security for Boxed Ambients
    • F-WAN: Foundations of Wide Area Network Computing
    • S. Crafa, M. Bugliesi, and G. Castagna. Information flow security for Boxed Ambients. In F-WAN: Foundations of Wide Area Network Computing, volume 63 of Electronic Notes in Theoretical Computer Science, 2002.
    • (2002) Electronic Notes in Theoretical Computer Science , vol.63
    • Crafa, S.1    Bugliesi, M.2    Castagna, G.3
  • 25
    • 84957644879 scopus 로고    scopus 로고
    • On the complexity analysis of static analyses
    • Static Analysis, 6th International Symposium, SAS 1999, Springer
    • D. McAllester. On the complexity analysis of static analyses. In Static Analysis, 6th International Symposium, SAS 1999, volume 1694 of Lecture Notes in Computer Science, pages 312-329. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1694 , pp. 312-329
    • McAllester, D.1
  • 26
    • 84874728872 scopus 로고    scopus 로고
    • Typing and subtyping mobility in Boxed Ambients
    • CONCUR 2002 - Concurrency Theory, Springer
    • M. Merro and V. Sassone. Typing and subtyping mobility in Boxed Ambients. In CONCUR 2002 - Concurrency Theory, volume 2421 of Lecture Notes in Computer Science, pages 304-320. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2421 , pp. 304-320
    • Merro, M.1    Sassone, V.2
  • 27
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 31
    • 35048826704 scopus 로고    scopus 로고
    • Validating firewalls in Mobile Ambients
    • CONCUR 1999 - Concurrency Theory, Springer
    • F. Nielson, H. Riis Nielson, R. R. Hansen, and J. G. Jensen. Validating firewalls in Mobile Ambients. In CONCUR 1999 - Concurrency Theory, volume 1664 of Lecture Notes in Computer Science, pages 463-477. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1664 , pp. 463-477
    • Nielson, F.1    Riis Nielson, H.2    Hansen, R.R.3    Jensen, J.G.4
  • 32
    • 84957064904 scopus 로고    scopus 로고
    • Automatic complexity analysis
    • Programming Languages and Systems. 11th European Symposium on Programming (ESOP 2002), number 2305 Springer
    • F. Nielson, H. Riis Nielson, and H. Seidl. Automatic complexity analysis. In Programming Languages and Systems. 11th European Symposium on Programming (ESOP 2002), number 2305 in Lecture Notes in Computer Science, pages 243-261. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , pp. 243-261
    • Nielson, F.1    Riis Nielson, H.2    Seidl, H.3
  • 34
    • 84958766164 scopus 로고    scopus 로고
    • Normalizable Horn clauses, strongly recognizable relations and Spi
    • Static Analysis, 9th International Symposium, SAS 2002, Springer
    • F. Nielson, H. Riis Nielson, and H. Seidl. Normalizable Horn clauses, strongly recognizable relations and Spi. In Static Analysis, 9th International Symposium, SAS 2002, volume 2477 of Lecture Notes in Computer Science, pages 20-35. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2477 , pp. 20-35
    • Nielson, F.1    Riis Nielson, H.2    Seidl, H.3
  • 36
    • 84945268253 scopus 로고    scopus 로고
    • Control-flow analysis in cubic time
    • Programming Languages and Systems. 10th European Symposium on Programming (ESOP 2001), Springer
    • F. Nielson and H. Seidl. Control-flow analysis in cubic time. In Programming Languages and Systems. 10th European Symposium on Programming (ESOP 2001), volume 2028 of Lecture Notes in Computer Science, pages 252-268. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2028 , pp. 252-268
    • Nielson, F.1    Seidl, H.2
  • 39
    • 35048825967 scopus 로고    scopus 로고
    • Flow Logic: A multi-paradigmatic approach to static analysis
    • The Essence of Computation: Complexity, Analysis, Transformation, Springer, to appear
    • H. Riis Nielson and F. Nielson. Flow Logic: a multi-paradigmatic approach to static analysis. In The Essence of Computation: Complexity, Analysis, Transformation, Lecture Notes in Computer Science. Springer, to appear.
    • Lecture Notes in Computer Science
    • Riis Nielson, H.1    Nielson, F.2
  • 40
    • 84874689325 scopus 로고    scopus 로고
    • Using ambients to control resources
    • CONCUR 2002 - Concurrency Theory, Springer
    • D. T. Teller, P. Zimmer, and D. Hirschkoff. Using ambients to control resources. In CONCUR 2002 - Concurrency Theory, volume 2421 of Lecture Notes in Computer Science, pages 288-303. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2421 , pp. 288-303
    • Teller, D.T.1    Zimmer, P.2    Hirschkoff, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.