메뉴 건너뛰기




Volumn 3148, Issue , 2004, Pages 100-115

Information flow analysis in logical form

Author keywords

[No Author keywords available]

Indexed keywords

RECONFIGURABLE HARDWARE; STATIC ANALYSIS;

EID: 35048839749     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-27864-1_10     Document Type: Article
Times cited : (77)

References (29)
  • 2
    • 35048823361 scopus 로고    scopus 로고
    • Information flow analysis in logical form
    • Kansas State University, April
    • Torben Amtoft and Anindya Banerjee. Information flow analysis in logical form. Technical Report CIS TR 2004-3, Kansas State University, April 2004.
    • (2004) Technical Report CIS TR 2004-3
    • Amtoft, T.1    Banerjee, A.2
  • 4
    • 84948752619 scopus 로고    scopus 로고
    • Secure information flow and pointer confinement in a Java-like language
    • IEEE Computer Society Press
    • Anindya Banerjee and David A. Naumann. Secure information flow and pointer confinement in a Java-like language. In IEEE Computer Security Foundations Workshop (CSFW), pages 253-270. IEEE Computer Society Press, 2002.
    • (2002) IEEE Computer Security Foundations Workshop (CSFW) , pp. 253-270
    • Banerjee, A.1    Naumann, D.A.2
  • 6
    • 0036555709 scopus 로고    scopus 로고
    • Information flow for Algol-like languages
    • David Clark, Chris Hankin, and Sebastian Hunt. Information flow for Algol-like languages. Computer Languages, 28(1):3-28, 2002.
    • (2002) Computer Languages , vol.28 , Issue.1 , pp. 3-28
    • Clark, D.1    Hankin, C.2    Hunt, S.3
  • 7
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • Richard A. DeMillo, David P. Dobkin, Anita K. Jones, and Richard J. Lipton, editors, Academic Press
    • Ellis S. Cohen. Information transmission in sequential programs. In Richard A. DeMillo, David P. Dobkin, Anita K. Jones, and Richard J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 8
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • ACM Press, New York, NY
    • Patrick Cousot and Radhia Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In ACM Symposium on Principles of Programming Languages (POPL), pages 238-252. ACM Press, New York, NY, 1977.
    • (1977) ACM Symposium on Principles of Programming Languages (POPL) , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 10
    • 14844353524 scopus 로고    scopus 로고
    • A theorem proving approach to analysis of secure information flow
    • Department of Computing Science, Chalmers University of Technology and Goteborg University, 2004. A fuller version of a paper appearing in Workshop on Issues in the Theory of Security
    • Ádám Darvas, Reiner Hähnle, and Dave Sands. A theorem proving approach to analysis of secure information flow. Technical Report 2004-01, Department of Computing Science, Chalmers University of Technology and Goteborg University, 2004. A fuller version of a paper appearing in Workshop on Issues in the Theory of Security, 2003.
    • (2003) Technical Report 2004-01
    • Darvas, Á.1    Hähnle, R.2    Sands, D.3
  • 11
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Dorothy Denning and Peter Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.1    Denning, P.2
  • 15
    • 35248827669 scopus 로고    scopus 로고
    • Software verification with Blast
    • Tenth International Workshop on Model Checking of Software (SPIN), Springer-Verlag
    • Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar, and Gregoire Sutre. Software verification with Blast. In Tenth International Workshop on Model Checking of Software (SPIN), volume 2648 of Lecture Notes in Computer Science, pages 235-239. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2648 , pp. 235-239
    • Henzinger, T.A.1    Jhala, R.2    Majumdar, R.3    Sutre, G.4
  • 16
    • 84976858409 scopus 로고
    • Binding time analysis: A new PERspective
    • Partial Evaluation and Semantics-Based Program Manipulation (PEPM '91)
    • Sebastian Hunt and David Sands. Binding time analysis: A new PERspective. In Partial Evaluation and Semantics-Based Program Manipulation (PEPM '91), volume 26 (9) of Sigplan Notices, pages 154-165, 1991.
    • (1991) Sigplan Notices , vol.26 , Issue.9 , pp. 154-165
    • Hunt, S.1    Sands, D.2
  • 19
    • 0023231848 scopus 로고
    • Specifications for multi-level security and a hook-up
    • April 27-29, 1987
    • Daryl McCullough. Specifications for multi-level security and a hook-up. In IEEE Symposium on Security and Privacy, April 27-29, 1987, pages 161-166, 1987.
    • (1987) IEEE Symposium on Security and Privacy , pp. 161-166
    • McCullough, D.1
  • 21
    • 84944269268 scopus 로고    scopus 로고
    • Local reasoning about programs that alter data structures
    • Computer Science Logic, Springer
    • Peter O'Hearn, John Reynolds, and Hongseok Yang. Local reasoning about programs that alter data structures. In Computer Science Logic, volume 2142 of LNCS, pages 1-19. Springer, 2001.
    • (2001) LNCS , vol.2142 , pp. 1-19
    • O'Hearn, P.1    Reynolds, J.2    Yang, H.3
  • 25
    • 0036051192 scopus 로고    scopus 로고
    • Separation logic: A logic for shared mutable data structures
    • IEEE Computer Society Press
    • John C. Reynolds. Separation logic: a logic for shared mutable data structures. In IEEE Symposium on Logic in Computer Science (LICS), pages 55-74. IEEE Computer Society Press, 2002.
    • (2002) IEEE Symposium on Logic in Computer Science (LICS) , pp. 55-74
    • Reynolds, J.C.1
  • 28
    • 0035276729 scopus 로고    scopus 로고
    • A Per model of secure information flow in sequential programs
    • Andrei Sabelfeld and David Sands. A Per model of secure information flow in sequential programs. Higher-order and Symbolic Computation, 14(1):59-91, 2001.
    • (2001) Higher-order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 29
    • 84956989228 scopus 로고    scopus 로고
    • A type-based approach to program security
    • number 1214 in Lecture Notes in Computer Science, Springer-Verlag
    • Dennis Volpano and Geoffrey Smith. A type-based approach to program security. In Proceedings of TAPSOFT'97, number 1214 in Lecture Notes in Computer Science, pages 607-621. Springer-Verlag, 1997.
    • (1997) Proceedings of TAPSOFT'97 , pp. 607-621
    • Volpano, D.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.