메뉴 건너뛰기




Volumn 3193, Issue , 2004, Pages 225-243

Information flow control revisited: Noninfluence = noninterference + nonleakage

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTERS;

EID: 35048854255     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30108-0_14     Document Type: Article
Times cited : (71)

References (24)
  • 4
    • 0022614502 scopus 로고
    • Extending the non-interference version of MLS for SAT
    • IEEE Computer Society Press
    • J. Haigh and W. Young. Extending the non-interference version of MLS for SAT. In Proc. of the Symposium on Security and Privacy, pages 232-239. IEEE Computer Society Press, 1986.
    • (1986) Proc. of the Symposium on Security and Privacy , pp. 232-239
    • Haigh, J.1    Young, W.2
  • 5
    • 0034244831 scopus 로고    scopus 로고
    • A Formal Security Model for Microprocessor Hardware
    • August
    • Volkmar Lotz, Volker Kessler, and Georg Walter. A Formal Security Model for Microprocessor Hardware. In IEEE Transactions on Software Engineering, volume 26, pages 702-712, August 2000.
    • (2000) IEEE Transactions on Software Engineering , vol.26 , pp. 702-712
    • Lotz, V.1    Kessler, V.2    Walter, G.3
  • 6
    • 84944059120 scopus 로고    scopus 로고
    • Unwinding possibilistic security properties
    • Proc. of ESORICS, Springer
    • Heiko Mantel. Unwinding possibilistic security properties. In Proc. of ESORICS, volume 1895 of LNCS, pages 238-254. Springer, 2000.
    • (2000) LNCS , vol.1895 , pp. 238-254
    • Mantel, H.1
  • 7
    • 84881123660 scopus 로고    scopus 로고
    • Information Flow and Applications - Bridging a Gap
    • Proc. of FME 2001: Formal Methods for Increasig Software Productivity, Springer
    • Heiko Mantel. Information Flow and Applications - Bridging a Gap. In Proc. of FME 2001: Formal Methods for Increasig Software Productivity, volume 2021 of LNCS, pages 153-172. Springer, 2001.
    • (2001) LNCS , vol.2021 , pp. 153-172
    • Mantel, H.1
  • 10
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • John McLean. A general theory of composition for trace sets closed under selective interleaving functions. In IEEE Symposium on Security and Privacy, pages 79-93, 1994.
    • (1994) IEEE Symposium on Security and Privacy , pp. 79-93
    • McLean, J.1
  • 11
    • 0034823079 scopus 로고    scopus 로고
    • A Generic Approach to the Security of Multi-threaded Programs
    • Cape Breton, Nova Scotia, Canada, IEEE Computer Society
    • Heiko Mantel and Andrei Sabelfeld. A Generic Approach to the Security of Multi-threaded Programs. In Proc. of 14th CSFW, pages 126-142, Cape Breton, Nova Scotia, Canada, 2001. IEEE Computer Society.
    • (2001) Proc. of 14th CSFW , pp. 126-142
    • Mantel, H.1    Sabelfeld, A.2
  • 12
    • 0348126394 scopus 로고    scopus 로고
    • Isabelle/HOL - A Proof Assistant for Higher-Order Logic
    • Springer
    • Tobias Nipkow, Lawrence C. Paulson, and Markus Wenzel. Isabelle/HOL - A Proof Assistant for Higher-Order Logic, volume 2283 of LNCS. Springer, 2002. See also http://isabelle.in.tum.de/docs.html.
    • (2002) LNCS , vol.2283
    • Nipkow, T.1    Paulson, L.C.2    Wenzel, M.3
  • 14
    • 84957035924 scopus 로고    scopus 로고
    • Formal Security Analysis with Interacting State Machines
    • th European Symposium on Research in Computer Security (ESORICS), Springer
    • th European Symposium on Research in Computer Security (ESORICS), volume 2502 of LNCS, pages 212-228. Springer, 2002. http://ddvo.net/papers/FSA_ISM.html.
    • (2002) LNCS , vol.2502 , pp. 212-228
    • Von Oheimb, D.1    Lotz, V.2
  • 16
    • 0029228214 scopus 로고
    • Absorbing covers and intransitive non-interference
    • Sylvan Pinsky. Absorbing covers and intransitive non-interference. In IEEE Symposium on Security and Privacy, pages 102-113, 1995.
    • (1995) IEEE Symposium on Security and Privacy , pp. 102-113
    • Pinsky, S.1
  • 19
    • 0003706571 scopus 로고
    • A CSP formulation of non-interference and unwinding
    • Cipher
    • Peter Ryan. A CSP formulation of non-interference and unwinding. In Proc. of IEEE CSFW-3. Cipher, 1990.
    • (1990) Proc. of IEEE CSFW-3
    • Ryan, P.1
  • 20
    • 84949243805 scopus 로고    scopus 로고
    • Mathematical models of computer security
    • Riccardo Focardi and Roberto Gorrieri, editors, Foundations of Security Analysis and Design: Tutorial Lectures, Springer
    • Peter Y. A. Ryan. Mathematical models of computer security. In Riccardo Focardi and Roberto Gorrieri, editors, Foundations of Security Analysis and Design: Tutorial Lectures, volume 2171 of LNCS. Springer, 2001.
    • (2001) LNCS , vol.2171
    • Ryan, P.Y.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.