메뉴 건너뛰기




Volumn 2664, Issue , 2003, Pages 199-218

A proof system for information flow security

Author keywords

[No Author keywords available]

Indexed keywords


EID: 35248883450     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45013-0_16     Document Type: Article
Times cited : (19)

References (28)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by Typing in Security Protocols
    • M. Abadi. Secrecy by Typing in Security Protocols. Journal of the ACM, 46(5):749-786, 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 0035838828 scopus 로고    scopus 로고
    • Static analysis for the pi-calculus with applications to security
    • C. Bodei, P. Degano, F. Nielson, and H. Nielson. Static analysis for the pi-calculus with applications to security. Information and Computation, 168(1):68-92, 2001.
    • (2001) Information and Computation , vol.168 , Issue.1 , pp. 68-92
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Nielson, H.4
  • 3
    • 84944047063 scopus 로고    scopus 로고
    • Transforming processes to ensure and check information flow security
    • H. Kirchner and C. Ringeissen, editors, Int. Conference on Algebraic Methodology and Software Technology (AMAST'02), Springer
    • A. Bossi, R. Focardi, C. Piazza, and S. Rossi. Transforming processes to ensure and check information flow security. In H. Kirchner and C. Ringeissen, editors, Int. Conference on Algebraic Methodology and Software Technology (AMAST'02), volume 2422 of LWCS, pages 271-286. Springer, 2002.
    • (2002) LWCS , vol.2422 , pp. 271-286
    • Bossi, A.1    Focardi, R.2    Piazza, C.3    Rossi, S.4
  • 4
    • 85029439013 scopus 로고
    • Symbolic Bisimulation Minimization
    • Proc. of Computer Aided Verification, Springer
    • A. Bouali and R. de Simone. Symbolic Bisimulation Minimization. In Proc. of Computer Aided Verification, volume 663 of LNCS, pages 96-108. Springer, 1992.
    • (1992) LNCS , vol.663 , pp. 96-108
    • Bouali, A.1    De Simone, R.2
  • 5
    • 84879520825 scopus 로고    scopus 로고
    • Non-Interference for Concurrent Programs
    • Proc. of Int. Colloquium on Automata, Languages and Programming, Springer
    • G. Boudol and I. Castellani. Non-Interference for Concurrent Programs. In Proc. of Int. Colloquium on Automata, Languages and Programming, volume 2076 of LNCS, pages 382-395. Springer, 2001.
    • (2001) LNCS , vol.2076 , pp. 382-395
    • Boudol, G.1    Castellani, I.2
  • 7
    • 84958780189 scopus 로고    scopus 로고
    • A Fast Bisimulation Algorithm
    • Proc. of Computer Aided Verification, Springer
    • A. Dovier, C. Piazza, and A. Policriti. A Fast Bisimulation Algorithm. In Proc. of Computer Aided Verification, volume 2102 of LNCS, pages 79-90. Springer, 2001.
    • (2001) LNCS , vol.2102 , pp. 79-90
    • Dovier, A.1    Piazza, C.2    Policriti, A.3
  • 9
    • 0001439194 scopus 로고    scopus 로고
    • The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
    • R. Focardi and R. Gorrieri. The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Transactions on Software Engineering, 23(9):550-571, 1997.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 10
    • 84988393004 scopus 로고    scopus 로고
    • Classification of Security Properties (Part I: Information Flow)
    • R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, Springer
    • R. Focardi and R. Gorrieri. Classification of Security Properties (Part I: Information Flow). In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS. Springer, 2001.
    • (2001) LNCS , vol.2171
    • Focardi, R.1    Gorrieri, R.2
  • 13
    • 84974577536 scopus 로고    scopus 로고
    • Information Flow vs. Resource Access in the Asynchronous Pi-Calculus
    • Proc. of Int. Colloquium on Automata, Languages and Programming (ICALP'00), Springer
    • M. Hennessy and J. Riely. Information Flow vs. Resource Access in the Asynchronous Pi-Calculus. In Proc. of Int. Colloquium on Automata, Languages and Programming (ICALP'00), volume 1853 of LNCS, pages 415-427. Springer, 2000.
    • (2000) LNCS , vol.1853 , pp. 415-427
    • Hennessy, M.1    Riely, J.2
  • 15
    • 0033701251 scopus 로고    scopus 로고
    • Possibilistic Definitions of Security - An Assebly Kit
    • IEEE
    • H. Mantel. Possibilistic Definitions of Security - An Assebly Kit -. In Proc. of the IEEE Symp. on Security and Privacy, pages 185-199. IEEE, 2000.
    • (2000) Proc. of the IEEE Symp. on Security and Privacy , pp. 185-199
    • Mantel, H.1
  • 16
    • 84944059120 scopus 로고    scopus 로고
    • Unwinding Possibilistic Security Properties
    • Proc. of European Symp. on Research in Computer Security, Springer
    • H. Mantel. Unwinding Possibilistic Security Properties. In Proc. of European Symp. on Research in Computer Security, volume 2895 of LNCS. Springer, 2000.
    • (2000) LNCS , vol.2895
    • Mantel, H.1
  • 17
    • 0031645024 scopus 로고    scopus 로고
    • Partial Model Checking and Theorem Proving for Ensuring Security Properties
    • IEEE
    • F. Martinelli. Partial Model Checking and Theorem Proving for Ensuring Security Properties. In Proc. Computer Security Foundations Workshop. IEEE, 1998.
    • (1998) Proc. Computer Security Foundations Workshop
    • Martinelli, F.1
  • 19
    • 0028058408 scopus 로고
    • A General Theory of Composition for Trace Sets Closed under Selective Interleaving Functions
    • J. McLean. A General Theory of Composition for Trace Sets Closed under Selective Interleaving Functions. In Proc. Symp. on Security and Privacy, pages 79-93, 1994.
    • (1994) Proc. Symp. on Security and Privacy , pp. 79-93
    • McLean, J.1
  • 22
    • 0023566630 scopus 로고
    • Three Partition Refinement Algorithms
    • R. Paige and R. E. Tarjan. Three Partition Refinement Algorithms. SIAM Journal on Computing, 16(6):973-989, 1987.
    • (1987) SIAM Journal on Computing , vol.16 , Issue.6 , pp. 973-989
    • Paige, R.1    Tarjan, R.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.