메뉴 건너뛰기




Volumn 15, Issue 3, 2007, Pages 373-416

Compositional information flow security for concurrent programs

Author keywords

Bisimulation; Concurrency; Noninterference; Security

Indexed keywords

COMPUTABILITY AND DECIDABILITY; COMPUTER PROGRAMMING LANGUAGES; CONCURRENT ENGINEERING; INFORMATION ANALYSIS;

EID: 34249893892     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2007-15303     Document Type: Article
Times cited : (22)

References (41)
  • 2
    • 35048839749 scopus 로고    scopus 로고
    • Information flow analysis in logical form
    • Proceedings of the 11th Static Analysis Symposium SAS'04, of, Springer
    • T. Amtoft and A. Banerjee, Information flow analysis in logical form, in: Proceedings of the 11th Static Analysis Symposium (SAS'04), volume 3148 of LNCS, Springer, 2004, pp. 100-115.
    • (2004) LNCS , vol.3148 , pp. 100-115
    • Amtoft, T.1    Banerjee, A.2
  • 6
    • 84879520825 scopus 로고    scopus 로고
    • Noninterference for concurrent programs
    • Proc. of Int. Colloquium on Automata, Languages and Progmmming ICALP'01, F. Orejas, P.G. Spirakis and J. van Leeuwen, eds, of, Springer
    • G. Boudol and I. Castellani, Noninterference for concurrent programs, in: Proc. of Int. Colloquium on Automata, Languages and Progmmming (ICALP'01), F. Orejas, P.G. Spirakis and J. van Leeuwen, eds, volume 2076 of LNCS, Springer, 2001, pp. 382-395.
    • (2001) LNCS , vol.2076 , pp. 382-395
    • Boudol, G.1    Castellani, I.2
  • 7
    • 0037014243 scopus 로고    scopus 로고
    • Noninterference for concurrent programs and tread systems
    • G. Boudol and I. Castellani, Noninterference for concurrent programs and tread systems, Theoretical Computer Science 281(1) (2002), 109-130.
    • (2002) Theoretical Computer Science , vol.281 , Issue.1 , pp. 109-130
    • Boudol, G.1    Castellani, I.2
  • 8
    • 85029837057 scopus 로고
    • Quantifier elimination for real closed fields by cylindrical algebraic decomposition
    • 2nd Gl Conf. on Automata Theory and Formal Languages, H. Barkhage, ed, of, Springer
    • G.E. Collins, Quantifier elimination for real closed fields by cylindrical algebraic decomposition, in: 2nd Gl Conf. on Automata Theory and Formal Languages, H. Barkhage, ed., volume 33 of LNCS, Springer, 1975, pp. 134-183.
    • (1975) LNCS , vol.33 , pp. 134-183
    • Collins, G.E.1
  • 9
    • 80052985571 scopus 로고
    • Partial cylindrical algebraic decomposition for quantifier elimination
    • G.E. Collins and H. Hong, Partial cylindrical algebraic decomposition for quantifier elimination, Journal, of Symbolic Computation 12 (1991), 299-328.
    • (1991) Journal, of Symbolic Computation , vol.12 , pp. 299-328
    • Collins, G.E.1    Hong, H.2
  • 11
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D.E. Denning and P.J. Denning, Certification of programs for secure information flow, Commun. ACM 20(7) (1977), 504-513.
    • (1977) Commun. ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 12
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (Part I: Information flow)
    • Proc. of Foundations of Security Analysis and Design FOSAD'Ol, R. Focardi and R. Gorrieri, eds, of, Springer
    • R. Focardi and R. Gorrieri, Classification of security properties (Part I: Information flow), in: Proc. of Foundations of Security Analysis and Design (FOSAD'Ol), R. Focardi and R. Gorrieri, eds, volume 2171 of LNCS, Springer, 2001, pp. 331-396.
    • (2001) LNCS , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 15
  • 18
    • 84944059120 scopus 로고    scopus 로고
    • Unwinding possibilistic security properties
    • Proc. of the European Symposium on Research in Computer Security ESoRiCS '00, of, Springer
    • H. Mantel, Unwinding possibilistic security properties, in: Proc. of the European Symposium on Research in Computer Security (ESoRiCS '00), volume 2895 of LNCS, Springer, 2000, pp. 238-254.
    • (2000) LNCS , vol.2895 , pp. 238-254
    • Mantel, H.1
  • 19
    • 0000528087 scopus 로고
    • Enumerable sets are diophantine
    • Y.V. Matiyasevich, Enumerable sets are diophantine, Soviet Mathematics Doklady 11(2) (1970), 354-358.
    • (1970) Soviet Mathematics Doklady , vol.11 , Issue.2 , pp. 354-358
    • Matiyasevich, Y.V.1
  • 24
    • 35048854255 scopus 로고    scopus 로고
    • Information flow control revisited: Noninfluence = noninterference + nonleakage
    • Proc. of the 9th European Symposium on Research in Computer Security ESORICS'04, of, Springer
    • D. von Oheimb, Information flow control revisited: noninfluence = noninterference + nonleakage, in: Proc. of the 9th European Symposium on Research in Computer Security (ESORICS'04), volume 3193 of LNCS, Springer, 2004, pp. 225-243.
    • (2004) LNCS , vol.3193 , pp. 225-243
    • von Oheimb, D.1
  • 25
    • 0001572510 scopus 로고
    • On the computational complexity and geometry of the first-order theory of the reals, parts I-III
    • J. Renegar, On the computational complexity and geometry of the first-order theory of the reals, parts I-III, Journal of Symbolic Computation 13 (1992), 255-352.
    • (1992) Journal of Symbolic Computation , vol.13 , pp. 255-352
    • Renegar, J.1
  • 27
    • 84958755151 scopus 로고    scopus 로고
    • Static confidentiality enforcement for distributed programs
    • Proc. of Int. Static Analysis Symposium SAS'02, M.V. Hermenegildo and G. Puebla, eds, of, Springer
    • A. Sabelfeld and H. Mantel, Static confidentiality enforcement for distributed programs, in: Proc. of Int. Static Analysis Symposium (SAS'02), M.V. Hermenegildo and G. Puebla, eds, volume 2477 of LNCS, Springer, 2002, pp. 376-394.
    • (2002) LNCS , vol.2477 , pp. 376-394
    • Sabelfeld, A.1    Mantel, H.2
  • 29
    • 35048828759 scopus 로고    scopus 로고
    • A model for delimited information release
    • Proceedings of the International Symposium on Software Security, Theories and Systems ISSS 2003, of, Springer
    • A. Sabelfeld and A.C. Myers, A model for delimited information release, in: Proceedings of the International Symposium on Software Security, Theories and Systems (ISSS 2003), volume 3233 of LNCS, Springer, 2003, pp. 174-191.
    • (2003) LNCS , vol.3233 , pp. 174-191
    • Sabelfeld, A.1    Myers, A.C.2
  • 31
    • 0035276729 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • A. Sabelfeld and D. Sands, A per model of secure information flow in sequential programs, Higher-Older and Symbolic Computation 14(1) (2001), 59-91.
    • (2001) Higher-Older and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 37
    • 84956989228 scopus 로고    scopus 로고
    • A type-based approach to program security
    • D.M. Volpano and G. Smith, A type-based approach to program security, in: TAPSOFT, 1997, pp. 607-621.
    • (1997) TAPSOFT , pp. 607-621
    • Volpano, D.M.1    Smith, G.2
  • 38
    • 0033330060 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language
    • D.M. Volpano and G. Smith, Probabilistic noninterference in a concurrent language, Journal of Computer Security 7(2-3) (1999), 231-253.
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 231-253
    • Volpano, D.M.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.