메뉴 건너뛰기




Volumn 180, Issue 1, 2007, Pages 17-34

Secured Information Flow for Asynchronous Sequential Processes

Author keywords

Access control; distribution; futures; objects

Indexed keywords

ACCESS CONTROL; DATA FLOW ANALYSIS; DATA PRIVACY; INTERNET; MATHEMATICAL MODELS; SEMANTICS;

EID: 34249781371     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2005.05.045     Document Type: Article
Times cited : (7)

References (25)
  • 2
    • 34249820299 scopus 로고    scopus 로고
    • Isabelle Attali, Denis Caromel, and Arnaud Contes. Hierarchical and declarative security for grid applications. In International Conference On High Performance Computing, HIPC, Hyderabad, India, December 17-20, Springer Verlag, 2003. Lecture Notes in Computer Science, LNCS
  • 3
    • 33947655397 scopus 로고    scopus 로고
    • Anindya Banerjee and David A. Naumann. Using access control for secure information flow in a java-like language. In 16th IEEE Computer Security Foundations Workshop (CSFW-16), July 2003
  • 4
    • 34249808866 scopus 로고    scopus 로고
    • David E. Bell and Leonard J. LaPadula. Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997 Rev. 1, The MITRE Corporation, Bedford, MA, March 1976
  • 9
    • 0011837296 scopus 로고    scopus 로고
    • Agostino Cortesi and Riccardo Focardi. Information flow security in mobile ambients. In International Workshop on Concurrency and Coordination (ConCoord'01), volume 54 of Electronic Notes on Theoretical Computer Science. Elsevier, July 2001
  • 11
    • 34249791523 scopus 로고    scopus 로고
    • XACML eXtensible Access Control Markup Language
    • XACML eXtensible Access Control Markup Language. http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml
  • 12
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (part i: Information flow)
    • Foundations of Security Analysis and Design (FOSAD 2000) - Tutorial Lectures, Springer-Verlag
    • Focardi R., and Gorrieri R. Classification of security properties (part i: Information flow). Foundations of Security Analysis and Design (FOSAD 2000) - Tutorial Lectures. Lecture Notes in Computer Science volume 2171 (2001), Springer-Verlag 331-396
    • (2001) Lecture Notes in Computer Science , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 13
    • 34249825530 scopus 로고    scopus 로고
    • Matthew Hennessy. The security picalculus and non-interference. Journal of Logic and Algebraic Programming, 2003. To Appear
  • 14
    • 34249818217 scopus 로고    scopus 로고
    • Matthew Hennessy and James Riely. Information flow vs. resource access in the asynchronous pi-calculus. Computer Science Technical Report 2000:03, The University of Sussex, 2000
  • 15
    • 17644369110 scopus 로고    scopus 로고
    • Peter Herrmann. Information flow analysis of component-structured applications. In 17th Annual Computer Security Applications Conference. The Applied Computer Security Associates (ACSA), 2001
  • 16
    • 84947269249 scopus 로고    scopus 로고
    • Secure information flow as typed process behaviour
    • Programming Languages and Systems, Springer-Verlag
    • Honda K., Vasconcelos V., and Yoshida N. Secure information flow as typed process behaviour. Programming Languages and Systems. Lecture Notes in Computer Science volume 1782 (2000), Springer-Verlag
    • (2000) Lecture Notes in Computer Science , vol.1782
    • Honda, K.1    Vasconcelos, V.2    Yoshida, N.3
  • 17
    • 78651546803 scopus 로고
    • A multilevel secure object-oriented data model
    • Abrams M.D., Jajodia S., and Podell H.J. (Eds), IEEE Computer Society Press
    • Jajodia S., Kogan B., and Sandhu R.S. A multilevel secure object-oriented data model. In: Abrams M.D., Jajodia S., and Podell H.J. (Eds). Information Security: An Integrated Collection of Essays (1995), IEEE Computer Society Press 596-616
    • (1995) Information Security: An Integrated Collection of Essays , pp. 596-616
    • Jajodia, S.1    Kogan, B.2    Sandhu, R.S.3
  • 19
    • 44049113210 scopus 로고    scopus 로고
    • Robin Milner, Joachim Parrow, and David Walker. A calculus of mobile processes, part I/II. 100:1-77, September 1992
  • 20
    • 0032646625 scopus 로고    scopus 로고
    • Andrew C. Myers. Jflow: Practical mostly-static information flow control. In 26th ACM Symposium on Principles of Programming Languages (POPL 99), pages 228-241. ACM Press, January 1999
  • 21
    • 34249813147 scopus 로고    scopus 로고
    • ProActive. http://www-sop.inria.fr/oasis/proactive/
    • ProActive1
  • 22
    • 84885715358 scopus 로고    scopus 로고
    • The impact of synchronisation on secure information flow in concurrent programs
    • 4th International Conference on Perspectives of System Informatics, Springer-Verlag
    • Sabelfeld A. The impact of synchronisation on secure information flow in concurrent programs. 4th International Conference on Perspectives of System Informatics. Lecture Notes in Computer Science volume 2244 (July 2001), Springer-Verlag
    • (2001) Lecture Notes in Computer Science , vol.2244
    • Sabelfeld, A.1
  • 24
    • 84964853055 scopus 로고    scopus 로고
    • Access control: Policies, models, and mechanisms
    • Foundations of Security Analysis and Design : Tutorial Lectures, Springer-Verlag
    • Samarati P., and De Capitani Di Vimercati S. Access control: Policies, models, and mechanisms. Foundations of Security Analysis and Design : Tutorial Lectures. Lecture Notes in Computer Science volume 2171 (2001), Springer-Verlag 137
    • (2001) Lecture Notes in Computer Science , vol.2171 , pp. 137
    • Samarati, P.1    De Capitani Di Vimercati, S.2
  • 25
    • 0036036793 scopus 로고    scopus 로고
    • Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers. Untrusted hosts and confidentiality: Secure program partitioning. In 18th ACM Symposium on Operating System Principles (SOSP '01), volume 35, pages 1-14. ACM Press, October 2001


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.