메뉴 건너뛰기




Volumn 3233, Issue , 2004, Pages 174-191

A Model for Delimited Information Release

Author keywords

Computer security; Confidentiality; Declassification; Information flow; Noninterference; Security policies; Security type systems

Indexed keywords

SECURITY OF DATA; SECURITY SYSTEMS;

EID: 35048828759     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-37621-7_9     Document Type: Article
Times cited : (129)

References (51)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • September
    • M. Abadi. Secrecy by typing in security protocols. J. ACM, 46(5):749-786, September 1999.
    • (1999) J. ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 3
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The Spi calculus
    • January
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The Spi calculus. Information and Computation, 148(1):1-70, January 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 8
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Academic Press
    • E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 9
    • 0033718531 scopus 로고    scopus 로고
    • Confidentiality for mobile code: The case of a simple payment protocol
    • July
    • M. Dam and P. Giambiagi. Confidentiality for mobile code: The case of a simple payment protocol. In Proc. IEEE Computer Security Foundations Workshop, pages 233-244, July 2000.
    • (2000) Proc. IEEE Computer Security Foundations Workshop , pp. 233-244
    • Dam, M.1    Giambiagi, P.2
  • 11
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 14
    • 1442287656 scopus 로고    scopus 로고
    • Abstract non-interference: Parameterizing noninterference by abstract interpretation
    • January
    • R. Giacobazzi and I. Mastroeni. Abstract non-interference: Parameterizing noninterference by abstract interpretation. In Proc. ACM Symp. on Principles of Programming Languages, pages 186-197, January 2004.
    • (2004) Proc. ACM Symp. on Principles of Programming Languages , pp. 186-197
    • Giacobazzi, R.1    Mastroeni, I.2
  • 15
    • 35248815514 scopus 로고    scopus 로고
    • On the secure implementation of security protocols
    • LNCS, Springer-Verlag, April
    • P. Giambiagi and M.Dam. On the secure implementation of security protocols. In Proc. European Symp. on Programming, volume 2618 of LNCS, pages 144-158. Springer-Verlag, April 2003.
    • (2003) Proc. European Symp. on Programming , vol.2618 , pp. 144-158
    • Giambiagi, P.1    Dam, M.2
  • 20
    • 0033751850 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • R. Joshi and K. R. M. Leino. A semantic approach to secure information flow. Science of Computer Programming, 37(1-3):113-138, 2000.
    • (2000) Science of Computer Programming , vol.37 , Issue.1-3 , pp. 113-138
    • Joshi, R.1    Leino, K.R.M.2
  • 21
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • Proc. European Symp. on Programming, Springer-Verlag, April
    • P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. European Symp. on Programming, volume 2028 of LNCS, pages 77-91. Springer-Verlag, April 2001.
    • (2001) LNCS , vol.2028
    • Laud, P.1
  • 22
    • 35248840989 scopus 로고    scopus 로고
    • Handling encryption in an analysis for secure information flow
    • Proc. European Symp. on Programming, SpringerVerlag, April
    • P. Laud. Handling encryption in an analysis for secure information flow. In Proc. European Symp. on Programming, volume 2618 of LNCS, pages 159-173. SpringerVerlag, April 2003.
    • (2003) LNCS , vol.2618 , pp. 159-173
    • Laud, P.1
  • 24
    • 84881123660 scopus 로고    scopus 로고
    • Information flow control and applications-Bridging a gap
    • Proc. Formal Methods Europe, Springer-Verlag, March
    • H. Mantel. Information flow control and applications-Bridging a gap. In Proc. Formal Methods Europe, volume 2021 of LNCS, pages 153-172. Springer-Verlag, March 2001.
    • (2001) LNCS , vol.2021 , pp. 153-172
    • Mantel, H.1
  • 26
    • 0025211594 scopus 로고
    • The specification and modeling of computer security
    • January
    • J. McLean. The specification and modeling of computer security. Computer, 23(1):9-16, January 1990.
    • (1990) Computer , vol.23 , Issue.1 , pp. 9-16
    • McLean, J.1
  • 29
    • 0031682833 scopus 로고    scopus 로고
    • Complete, safe information flow with decentralized labels
    • May
    • A. C. Myers and B. Liskov. Complete, safe information flow with decentralized labels. In Proc. IEEE Symp. on Security and Privacy, pages 186-197, May 1998.
    • (1998) Proc. IEEE Symp. on Security and Privacy , pp. 186-197
    • Myers, A.C.1    Liskov, B.2
  • 32
    • 0029228214 scopus 로고
    • Absorbing covers and intransitive non-interference
    • May
    • S. Pinsky. Absorbing covers and intransitive non-interference. In Proc. IEEE Symp. on Security and Privacy, pages 102-113, May 1995.
    • (1995) Proc. IEEE Symp. on Security and Privacy , pp. 102-113
    • Pinsky, S.1
  • 36
    • 0003502331 scopus 로고
    • Noninterference, transitivity, and channel-control security policies
    • SRI International
    • J. M. Rushby. Noninterference, transitivity, and channel-control security policies. Technical Report CSL-92-02, SRI International, 1992.
    • (1992) Technical Report CSL-92-02
    • Rushby, J.M.1
  • 39
    • 0035276729 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • March
    • A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher Order and Symbolic Computation, 14(1):59-91, March 2001.
    • (2001) Higher Order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 45
    • 0033330060 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language
    • November
    • D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. J. Computer Security, 7(2-3):231-253, November 1999.
    • (1999) J. Computer Security , vol.7 , Issue.2-3 , pp. 231-253
    • Volpano, D.1    Smith, G.2
  • 47
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3): 167-187, 1996.
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 51
    • 84945262623 scopus 로고    scopus 로고
    • Secure information flow and CPS
    • Proc. European Symp. on Programming, Springer-Verlag, April
    • S. Zdancewic and A. C. Myers. Secure information flow and CPS. In Proc. European Symp. on Programming, volume 2028 of LNCS, pages 46-61. Springer-Verlag, April 2001.
    • (2001) LNCS , vol.2028 , pp. 46-61
    • Zdancewic, S.1    Myers, A.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.