메뉴 건너뛰기




Volumn 2767, Issue , 2003, Pages 257-272

Formal security policy verification of distributed component-structured software

Author keywords

[No Author keywords available]

Indexed keywords

COMPLIANCE CONTROL; NETWORK SECURITY; SECURITY SYSTEMS; SPECIFICATIONS; VERIFICATION;

EID: 35248838889     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-39979-7_17     Document Type: Article
Times cited : (13)

References (28)
  • 3
    • 0032097883 scopus 로고    scopus 로고
    • A Map of Security Risks Associated with Using COTS
    • Lindqvist, U., Jonsson, E.: A Map of Security Risks Associated with Using COTS. IEEE Computer 31 (1998) 60-66
    • (1998) IEEE Computer , vol.31 , pp. 60-66
    • Lindqvist, U.1    Jonsson, E.2
  • 5
    • 0034872904 scopus 로고    scopus 로고
    • Trust-adapted enforcement of security policies in distributed component-structured applications
    • Hammamet, IEEE Computer Society Press
    • Herrmann, P., Krumm, H.: Trust-adapted enforcement of security policies in distributed component-structured applications. In: Proceedings of the 6th IEEE Symposium on Computers and Communications, Hammamet, IEEE Computer Society Press (2001) 2-8
    • (2001) Proceedings of the 6th IEEE Symposium on Computers and Communications , pp. 2-8
    • Herrmann, P.1    Krumm, H.2
  • 8
    • 34250724930 scopus 로고    scopus 로고
    • Trust-Based Protection of Software Component Users and Designers
    • Nixon, P., Terzis, S., eds.: Proceedings of the 1st International Conference on Trust Management. Heraklion, Springer-Verlag
    • Herrmann, P.: Trust-Based Protection of Software Component Users and Designers. In Nixon, P., Terzis, S., eds.: Proceedings of the 1st International Conference on Trust Management. LNCS 2692, Heraklion, Springer-Verlag (2003) 75-90
    • (2003) LNCS , vol.2692 , pp. 75-90
    • Herrmann, P.1
  • 9
    • 0007863633 scopus 로고    scopus 로고
    • A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components
    • Canberra, IEEE Computer Society Press
    • Khan, K., Han, J., Zheng, Y.: A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components. In: Proceedings of the Australian Software Engineering Conference (ASWEC'01), Canberra, IEEE Computer Society Press (2001) 117-126
    • (2001) Proceedings of the Australian Software Engineering Conference (ASWEC'01) , pp. 117-126
    • Khan, K.1    Han, J.2    Zheng, Y.3
  • 12
    • 0033691822 scopus 로고    scopus 로고
    • A Framework for Modeling Transfer Protocols
    • Herrmann, P., Krumm, H.: A Framework for Modeling Transfer Protocols. Computer Networks 34 (2000) 317-337
    • (2000) Computer Networks , vol.34 , pp. 317-337
    • Herrmann, P.1    Krumm, H.2
  • 13
    • 0001829728 scopus 로고
    • Architecture and specification style in formal descriptions of distributed systems
    • Agarwal, S., Sabnani, K., eds.: Elsevier, IFIP
    • Vissers, C.A., Scollo, G., van Sinderen, M.: Architecture and specification style in formal descriptions of distributed systems. In Agarwal, S., Sabnani, K., eds.: Protocol Specification, Testing and Verification. Volume VIII., Elsevier, IFIP (1988) 189-204
    • (1988) Protocol Specification, Testing and Verification , vol.8 , pp. 189-204
    • Vissers, C.A.1    Scollo, G.2    Van Sinderen, M.3
  • 14
    • 0024664310 scopus 로고
    • Decentralization of process nets with a centralized control
    • Back, R.J.R., Kurkio-Suonio, R.: Decentralization of process nets with a centralized control. Distributed Computing (1989) 73-87
    • (1989) Distributed Computing , pp. 73-87
    • Back, R.J.R.1    Kurkio-Suonio, R.2
  • 15
    • 0141797474 scopus 로고    scopus 로고
    • Framework and Tool Support for Formal Verification of High Speed Transfer Protocol Designs
    • Herrmann, P., Krumm, H., Drögehorn, O., Geisselhardt, W.: Framework and Tool Support for Formal Verification of High Speed Transfer Protocol Designs. Telecommunication Systems 20 (2002) 291-310
    • (2002) Telecommunication Systems , vol.20 , pp. 291-310
    • Herrmann, P.1    Krumm, H.2    Drögehorn, O.3    Geisselhardt, W.4
  • 16
    • 22044434009 scopus 로고    scopus 로고
    • Modular Specification and Verification of XTP
    • Herrmann, P., Krumm, H.: Modular Specification and Verification of XTP. Telecommunication Systems 9 (1998) 207-221
    • (1998) Telecommunication Systems , vol.9 , pp. 207-221
    • Herrmann, P.1    Krumm, H.2
  • 19
    • 84958759039 scopus 로고    scopus 로고
    • etc - A Tool Supporting the Construction of cTLA-Specifications
    • Margaria, T., Steffen, B., eds.: Tools and Algorithms for the Construction and Analysis of Systems. Number 1055 Springer-Verlag
    • Heyl, C., Mester, A., Krumm, H.: etc - A Tool Supporting the Construction of cTLA-Specifications. In Margaria, T., Steffen, B., eds.: Tools and Algorithms for the Construction and Analysis of Systems. Number 1055 in Lecture Notes in Computer Science, Springer-Verlag (1996) 407-411
    • (1996) Lecture Notes in Computer Science , pp. 407-411
    • Heyl, C.1    Mester, A.2    Krumm, H.3
  • 22
    • 84884311106 scopus 로고    scopus 로고
    • Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies
    • Osborn, S.L., Sandhu, R.S., Munawer, Q.: Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security 3 (2000) 85-106
    • (2000) ACM Transactions on Information and System Security , vol.3 , pp. 85-106
    • Osborn, S.L.1    Sandhu, R.S.2    Munawer, Q.3
  • 23
    • 84957886335 scopus 로고    scopus 로고
    • Modeling the security of steganographic systems
    • Proceedings of the 2nd Workshop of Information Hiding. Portland, Springer-Verlag
    • Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In: Proceedings of the 2nd Workshop of Information Hiding. LNCS 1525, Portland, Springer-Verlag (1998) 345-355
    • (1998) LNCS , vol.1525 , pp. 345-355
    • Zöllner, J.1    Federrath, H.2    Klimant, H.3    Pfitzmann, A.4    Piotraschke, R.5    Westfeld, A.6    Wicke, G.7    Wolf, G.8


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.