메뉴 건너뛰기




Volumn 92, Issue 11, 2007, Pages 1503-1520

A formal approach to the integrated analysis of security and QoS

Author keywords

Case studies; Formal methods; Noninterference; Process algebra; QoS; Security; Tools

Indexed keywords

ALGEBRA; DISTRIBUTED COMPUTER SYSTEMS; FORMAL METHODS; INFORMATION ANALYSIS; QUALITY OF SERVICE;

EID: 34447102446     PISSN: 09518320     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ress.2006.10.003     Document Type: Article
Times cited : (14)

References (27)
  • 4
    • 3042529082 scopus 로고    scopus 로고
    • A process-algebraic approach for the analysis of probabilistic noninterference
    • Aldini A., Bravetti M., and Gorrieri R. A process-algebraic approach for the analysis of probabilistic noninterference. J Comput Secur 12 (2004) 191-245
    • (2004) J Comput Secur , vol.12 , pp. 191-245
    • Aldini, A.1    Bravetti, M.2    Gorrieri, R.3
  • 5
    • 34447108296 scopus 로고    scopus 로고
    • Stravridou V, Dutertre B. From Security to Safety and Back, in: second workshop on computer security, fault tolerance, and software assurance: from needs to solutions, Williamsburg, VA, 1998.
  • 6
    • 0020299523 scopus 로고    scopus 로고
    • Goguen JA, Meseguer J. Security policy and security models. in: Symposium on security and privacy (SSP'82). IEEE CS Press; 1982. p. 11-20.
  • 7
    • 84974776068 scopus 로고
    • A classification of security properties
    • Focardi R., and Gorrieri R. A classification of security properties. J Comput Secur 3 (1995) 5-33
    • (1995) J Comput Secur , vol.3 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 9
    • 0003866146 scopus 로고
    • Lavenberg S.S. (Ed), Academic Press, New York
    • In: Lavenberg S.S. (Ed). Computer performance modeling handbook (1983), Academic Press, New York
    • (1983) Computer performance modeling handbook
  • 11
    • 34447099980 scopus 로고    scopus 로고
    • Bernardo M. TwoTowers 5.1 user manual. 〈http://www.sti.uniurb.it/bernardo/twotowers/〉, 2006.
  • 12
    • 0032047528 scopus 로고    scopus 로고
    • Kang MH, Moore AP, Moskowitz IS. Design and assurance strategy for the NRL Pump, NRL memo 5540-97-7991, Naval Research Laboratory, Washington, DC, 1997. IEEE Comput Mag 1998;31:56-64.
  • 14
    • 18944373905 scopus 로고    scopus 로고
    • Automatic analysis of the NRL Pump, selected papers from MEFISTO project "Formal Methods for Security"
    • Lanotte R., Maggiolo-Schettini A., Tini S., Troina A., and Tronci E. Automatic analysis of the NRL Pump, selected papers from MEFISTO project "Formal Methods for Security". ENTCS 99 (2004) 245-266
    • (2004) ENTCS , vol.99 , pp. 245-266
    • Lanotte, R.1    Maggiolo-Schettini, A.2    Tini, S.3    Troina, A.4    Tronci, E.5
  • 16
  • 22
    • 34447094241 scopus 로고    scopus 로고
    • Cavada R, Cimatti A, Olivetti E, Pistore M, Roveri M. NuSMV 2.1 user manual, 〈http://nusmv.irst.itc.it/〉, 2002.
  • 23
    • 0037209806 scopus 로고    scopus 로고
    • Performance measure sensitive congruencies for Markovian process algebras
    • Bernardo M., and Bravetti M. Performance measure sensitive congruencies for Markovian process algebras. Theor Comput Sci 290 (2003) 117-160
    • (2003) Theor Comput Sci , vol.290 , pp. 117-160
    • Bernardo, M.1    Bravetti, M.2
  • 24
    • 84948775168 scopus 로고    scopus 로고
    • Lowe G. Quantifying information flow. In: 15th computer security foundation workshop (CSFW'02). IEEE CS Press; 2002. p. 18-31.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.