메뉴 건너뛰기




Volumn 3302, Issue , 2004, Pages 129-145

Controlled declassification based on intransitive noninterference

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; COMPUTATIONAL LINGUISTICS; INFORMATION FILTERING;

EID: 35048815139     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30477-7_9     Document Type: Article
Times cited : (73)

References (26)
  • 2
    • 0003400251 scopus 로고
    • Secure Computer Systems: Unified Exposition and Multics Interpretation
    • [BL76] MITRE
    • [BL76] D. E. Bell and L. LaPadula. Secure Computer Systems: Unified Exposition and Multics Interpretation. Technical Report MTR-2997, MITRE, 1976.
    • (1976) Technical Report MTR-2997
    • Bell, D.E.1    Lapadula, L.2
  • 3
    • 84957037045 scopus 로고    scopus 로고
    • Computational Probabilistic Non-interference
    • [BP02] LNCS 2502
    • [BP02] M. Backes and B. Pfitzmann. Computational Probabilistic Non-interference. In Proceedings of ESORICS, LNCS 2502, pages 1-23, 2002.
    • (2002) Proceedings of ESORICS , pp. 1-23
    • Backes, M.1    Pfitzmann, B.2
  • 4
    • 4944242009 scopus 로고    scopus 로고
    • Modelling Downgrading in Information Flow Security
    • [BPR04] to appear
    • [BPR04] A. Bossi, C. Piazza, and S. Rossi. Modelling Downgrading in Information Flow Security. In Proc. of IEEE CSFW, 2004. to appear.
    • (2004) Proc. of IEEE CSFW
    • Bossi, A.1    Piazza, C.2    Rossi, S.3
  • 6
    • 0001760770 scopus 로고
    • Information Transmission in Sequential Programs
    • [Coh78] Academic Press
    • [Coh78] E. S. Cohen. Information Transmission in Sequential Programs. In Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 7
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • [Den76]
    • [Den76] D. E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5):236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 9
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • [Koc96] Neal Koblitz, editor, LNCS, Springer-Verlag
    • [Koc96] P. C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Neal Koblitz, editor, Advances in Cryptology -CRYPTO'96, volume 1109 of LNCS, pages 104-113. Springer-Verlag, 1996.
    • (1996) Advances in Cryptology -CRYPTO'96 , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 10
    • 35248840989 scopus 로고    scopus 로고
    • Handling Encryption in an Analysis for Secure Information Flow
    • [Lau03] LNCS 2618, Springer-Verlag
    • [Lau03] P. Laud. Handling Encryption in an Analysis for Secure Information Flow. In Proceedings of ESOP, LNCS 2618, pages 159-173. Springer-Verlag, 2003.
    • (2003) Proceedings of ESOP , pp. 159-173
    • Laud, P.1
  • 11
    • 84948775168 scopus 로고    scopus 로고
    • Quantifying Information Flow
    • [Low02]
    • [Low02] G. Lowe. Quantifying Information Flow. In Proceedings of IEEE CSFW, pages 18-31, 2002.
    • (2002) Proceedings of IEEE CSFW , pp. 18-31
    • Lowe, G.1
  • 12
    • 84881123660 scopus 로고    scopus 로고
    • Information Flow Control and Applications - Bridging a Gap
    • [Man01] LNCS 2021
    • [Man01] H. Mantel. Information Flow Control and Applications - Bridging a Gap. In Proceedings of Formal Methods Europe, LNCS 2021, pages 153-172, 2001.
    • (2001) Proceedings of Formal Methods Europe , pp. 153-172
    • Mantel, H.1
  • 16
    • 0029228214 scopus 로고
    • Absorbing Covers and Intransitive Non-Interference
    • [Pin95] Oakland, CA, USA
    • [Pin95] S. Pinsky. Absorbing Covers and Intransitive Non-Interference. In Proceedings of the IEEE Symposium on Security and Privacy, pages 102-113, Oakland, CA, USA, 1995.
    • (1995) Proceedings of the IEEE Symposium on Security and Privacy , pp. 102-113
    • Pinsky, S.1
  • 17
  • 18
    • 0003502331 scopus 로고
    • Noninterference, Transitivity, and Channel-Control Security Policies
    • [Rus92] SRI International
    • [Rus92] J. M. Rushby. Noninterference, Transitivity, and Channel-Control Security Policies. Technical Report CSL-92-02, SRI International, 1992.
    • (1992) Technical Report CSL-92-02
    • Rushby, J.M.1
  • 21
    • 0033700286 scopus 로고    scopus 로고
    • Probabilistic Noninterference for Multi-threaded Programs
    • [SS00]
    • [SS00] A. Sabelfeld and D. Sands. Probabilistic Noninterference for Multi-threaded Programs. In Proceedings of IEEE CSFW, pages 200-214, 2000.
    • (2000) Proceedings of IEEE CSFW , pp. 200-214
    • Sabelfeld, A.1    Sands, D.2
  • 22
    • 0035276729 scopus 로고    scopus 로고
    • A Per Model of Secure Information Flow in Sequential Programs
    • [SS01]
    • [SS01] A. Sabelfeld and D. Sands. A Per Model of Secure Information Flow in Sequential Programs. HOSC, 14(1):59-91, 2001.
    • (2001) HOSC , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 23
    • 0030673701 scopus 로고    scopus 로고
    • Eliminating Covert Flows with Minimum Typings
    • [VS97]
    • [VS97] D. Volpano and G. Smith. Eliminating Covert Flows with Minimum Typings. In Proceedings of IEEE CSFW, pages 156-168, 1997.
    • (1997) Proceedings of IEEE CSFW , pp. 156-168
    • Volpano, D.1    Smith, G.2
  • 24
    • 0033705210 scopus 로고    scopus 로고
    • Verifying Secrets and Relative Secrecy
    • [VS00]
    • [VS00] D. M. Volpano and G. Smith. Verifying Secrets and Relative Secrecy. In Proceedings of POPL, pages 268-276, 2000.
    • (2000) Proceedings of POPL , pp. 268-276
    • Volpano, D.M.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.