메뉴 건너뛰기




Volumn 2575, Issue , 2003, Pages 223-237

Bisimulation and unwinding for verifying possibilistic security properties

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 35248852380     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36384-x_19     Document Type: Article
Times cited : (19)

References (35)
  • 2
    • 35248883450 scopus 로고    scopus 로고
    • A Proof System for Information Flow Security
    • M. Leuschel, editor, Proc. of Int. Workshop on Logic Based Program Development and Transformation, Springer-Verlag, To appear
    • A. Bossi, R. Focardi, C. Piazza, and S. Rossi. A Proof System for Information Flow Security. In M. Leuschel, editor, Proc. of Int. Workshop on Logic Based Program Development and Transformation, LNCS. Springer-Verlag, 2002. To appear.
    • (2002) LNCS
    • Bossi, A.1    Focardi, R.2    Piazza, C.3    Rossi, S.4
  • 4
    • 84974776068 scopus 로고
    • A Classification of Security Properties for Process Algebras
    • R. Focardi and R. Gorrieri. A Classification of Security Properties for Process Algebras. Journal of Computer Security, 3(1):5-33, 1994/1995.
    • (1994) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 5
    • 0001439194 scopus 로고    scopus 로고
    • The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
    • R. Focardi and R. Gorrieri. The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Transactions on Software Engineering, 23(9):550-571, 1997.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 6
    • 84988393004 scopus 로고    scopus 로고
    • Classification of Security Properties (Part I: Information Flow)
    • R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, Springer-Verlag
    • R. Focardi and R. Gorrieri. Classification of Security Properties (Part I: Information Flow). In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2171
    • Focardi, R.1    Gorrieri, R.2
  • 7
    • 84876687849 scopus 로고    scopus 로고
    • Proof Methods for Bisimulation based Information Flow Security
    • A. Cortesi, editor, Proc. of Int. Workshop on Verification, Model Checking and Abstract Interpretation, Springer-Verlag
    • R. Focardi, C. Piazza, and S. Rossi. Proof Methods for Bisimulation based Information Flow Security. In A. Cortesi, editor, Proc. of Int. Workshop on Verification, Model Checking and Abstract Interpretation, volume 2294 of LNCS, pages 16-31. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2294 , pp. 16-31
    • Focardi, R.1    Piazza, C.2    Rossi, S.3
  • 9
    • 0023241098 scopus 로고
    • A Universal Theory of Information Flow
    • IEEE Computer Society Press
    • S. N. Foley. A Universal Theory of Information Flow. In Proc. of the IEEE Symposium on Security and Privacy, pages 116-122. IEEE Computer Society Press, 1987.
    • (1987) Proc. of the IEEE Symposium on Security and Privacy , pp. 116-122
    • Foley, S.N.1
  • 14
    • 0024663847 scopus 로고
    • On the Derivation of Secure Components
    • IEEE Computer Society Press
    • J. Jacob. On the Derivation of Secure Components. In Proc. of the IEEE Symposium on Security and Privacy, pages 242-247. IEEE Computer Society Press, 1989.
    • (1989) Proc. of the IEEE Symposium on Security and Privacy , pp. 242-247
    • Jacob, J.1
  • 16
    • 0033701251 scopus 로고    scopus 로고
    • Possibilistic Definitions of Security - An Assebly Kit
    • IEEE Computer Society Press
    • H. Mantel. Possibilistic Definitions of Security - An Assebly Kit -. In Proc. of the IEEE Symposium on Security and Privacy, pages 185-199. IEEE Computer Society Press, 2000.
    • (2000) Proc. of the IEEE Symposium on Security and Privacy , pp. 185-199
    • Mantel, H.1
  • 17
    • 84944059120 scopus 로고    scopus 로고
    • Unwinding Possibilistic Security Properties
    • Proc. of the European Symposium on Research in Computer Security, Springer-Verlag
    • H. Mantel. Unwinding Possibilistic Security Properties. In Proc. of the European Symposium on Research in Computer Security, volume 2895 of LNCS, pages 238-254. Springer-Verlag, 2000.
    • (2000) LNCS , vol.2895 , pp. 238-254
    • Mantel, H.1
  • 18
    • 0034836335 scopus 로고    scopus 로고
    • Preserving Information Flow Properties under Refinement
    • IEEE Computer Society Press
    • H. Mantel. Preserving Information Flow Properties under Refinement. In Proc. of the IEEE Symposium on Security and Privacy, pages 78-91. IEEE Computer Society Press, 2001.
    • (2001) Proc. of the IEEE Symposium on Security and Privacy , pp. 78-91
    • Mantel, H.1
  • 19
    • 0036083020 scopus 로고    scopus 로고
    • On the Composition of Secure Systems
    • IEEE Computer Society Press
    • H. Mantel. On the Composition of Secure Systems. In Proc. of the IEEE Symposium on Security and Privacy, pages 88-101. IEEE Computer Society Press, 2002.
    • (2002) Proc. of the IEEE Symposium on Security and Privacy , pp. 88-101
    • Mantel, H.1
  • 20
    • 0031645024 scopus 로고    scopus 로고
    • Partial Model Checking and Theorem Proving for Ensuring Security Properties
    • IEEE Computer Society Press
    • F. Martinelli. Partial Model Checking and Theorem Proving for Ensuring Security Properties. In Proc. of the IEEE Computer Security Foundations Workshop, pages 44-52. IEEE Computer Society Press, 1998.
    • (1998) Proc. of the IEEE Computer Security Foundations Workshop , pp. 44-52
    • Martinelli, F.1
  • 21
    • 0023231848 scopus 로고
    • Specifications for Multi-Level Security and a Hook-Up Property
    • IEEE Computer Society Press
    • D. McCullough. Specifications for Multi-Level Security and a Hook-Up Property. In Proc. of the IEEE Symposium on Security and Privacy, pages 161-166. IEEE Computer Society Press, 1987.
    • (1987) Proc. of the IEEE Symposium on Security and Privacy , pp. 161-166
    • McCullough, D.1
  • 22
    • 0025139568 scopus 로고
    • Security Models and Information Flow
    • IEEE Computer Society Press
    • J. McLean. Security Models and Information Flow. In Proc. of the IEEE Symposium on Security and Privacy, pages 180-187. IEEE Computer Society Press, 1990.
    • (1990) Proc. of the IEEE Symposium on Security and Privacy , pp. 180-187
    • McLean, J.1
  • 23
    • 0028058408 scopus 로고
    • A General Theory of Composition for Trace Sets Closed under Selective Interleaving Functions
    • IEEE Computer Society Press
    • J. McLean. A General Theory of Composition for Trace Sets Closed under Selective Interleaving Functions. In Proc. of the IEEE Symposium on Security and Privacy, pages 79-93. IEEE Computer Society Press, 1994.
    • (1994) Proc. of the IEEE Symposium on Security and Privacy , pp. 79-93
    • McLean, J.1
  • 25
    • 0002426876 scopus 로고    scopus 로고
    • A General Theory of Composition for a Class of "Possibilistic" Security Properties
    • J. McLean. A General Theory of Composition for a Class of "Possibilistic" Security Properties. IEEE Trabsactions on Software Engineering, 22(1):53-67, 1996.
    • (1996) IEEE Trabsactions on Software Engineering , vol.22 , Issue.1 , pp. 53-67
    • McLean, J.1
  • 30
    • 0023566630 scopus 로고
    • Three partition refinement algorithms
    • R. Paige and R. E. Tarjan. Three partition refinement algorithms. SIAM Journal on Computing, 16(6):973-989, 1987.
    • (1987) SIAM Journal on Computing , vol.16 , Issue.6 , pp. 973-989
    • Paige, R.1    Tarjan, R.E.2
  • 31
    • 0001868056 scopus 로고
    • Non-interference through Determinism
    • Proc. of the European Symposium on Research in Computer Security, Springer-Verlag
    • A. W. Roscoe, J. C. P. Woodcock, and L. Wulf. Non-interference through Determinism. In Proc. of the European Symposium on Research in Computer Security, volume 875 of LNCS, pages 33-53. Springer-Verlag, 1994.
    • (1994) LNCS , vol.875 , pp. 33-53
    • Roscoe, A.W.1    Woodcock, J.C.P.2    Wulf, L.3
  • 32
    • 0003142759 scopus 로고
    • A CSP Formulation of Non-interference and Unwinding
    • P. Y. A. Ryan. A CSP Formulation of Non-interference and Unwinding. Cipher, pages 19-27, 1991.
    • (1991) Cipher , pp. 19-27
    • Ryan, P.Y.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.