메뉴 건너뛰기




Volumn , Issue , 2007, Pages 41-46

A simulation-based proof technique for dynamic information flow

Author keywords

Dynamic analysis; Implicit flow; Information flow analysis

Indexed keywords

DYNAMIC INFORMATION FLOW; INFORMATION-FLOW ANALYSIS; SECRET INFORMATION;

EID: 36448929074     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1255329.1255336     Document Type: Conference Paper
Times cited : (17)

References (23)
  • 1
    • 33746371722 scopus 로고    scopus 로고
    • Quantifying Information Leakage in Process Calculi
    • Michele Boreale: Quantifying Information Leakage in Process Calculi. ICALP (2) 2006: 119-131
    • (2006) ICALP , vol.2 , pp. 119-131
    • Michele Boreale1
  • 2
    • 35048848903 scopus 로고    scopus 로고
    • Anonymity Protocols as Noisy Channels
    • Postproceedings of the Symp. on Trustworthy Global Computing, Springer
    • K. Chatzikokolakis, C. Palamidessi, P. Panangaden. Anonymity Protocols as Noisy Channels, in: Postproceedings of the Symp. on Trustworthy Global Computing, Lecture Notes in Computer Science, Springer, 2006,
    • (2006) Lecture Notes in Computer Science
    • Chatzikokolakis, K.1    Palamidessi, C.2    Panangaden, P.3
  • 3
    • 34249899908 scopus 로고    scopus 로고
    • David Clark, Sebastian Hunt, Pasquale Malacaria: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, 15, Number 3 / 2007.
    • David Clark, Sebastian Hunt, Pasquale Malacaria: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, Volume 15, Number 3 / 2007.
  • 7
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning: A lattice model of secure information flow. Communications of the ACM, 19(5), May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5
    • Denning, D.E.1
  • 8
    • 0026157130 scopus 로고
    • Toward a methematical foundataion for information flow security
    • Oakland, California, May
    • James W Gray III: Toward a methematical foundataion for information flow security. Proc. 1991 IEEE Symposium on Security and Privacy. Oakland, California, May 1991.
    • (1991) Proc. 1991 IEEE Symposium on Security and Privacy
    • Gray III, J.W.1
  • 9
    • 0032047481 scopus 로고    scopus 로고
    • Paul F Syverson: A logical approach to multilevel security of probabilistic systems
    • James W Gray III, Paul F Syverson: A logical approach to multilevel security of probabilistic systems. Distributed Computing, 11(2):73-90, 1998.
    • (1998) Distributed Computing , vol.11 , Issue.2 , pp. 73-90
    • Gray III, J.W.1
  • 12
    • 36448984450 scopus 로고
    • Mclean: Security models and information flow
    • Oakland, California, May
    • John. Mclean: Security models and information flow. Proc. 1990 IEEE Symposium on Security and Privacy. Oakland, California, May 1990.
    • (1990) Proc. 1990 IEEE Symposium on Security and Privacy
    • John1
  • 15
    • 36448944818 scopus 로고    scopus 로고
    • Flemming Nielson, Hanne Riis Nielson, Chris Hankin. Principles of Program. Analysis, Springer. 1999.
    • Flemming Nielson, Hanne Riis Nielson, Chris Hankin. Principles of Program. Analysis, Springer. 1999.
  • 17
    • 36448942672 scopus 로고    scopus 로고
    • Hughes, David Naumann, Andrei Sabelfeld: Closing Internal Timing Channels by Transformation
    • Tokyo, Japan, December 6-8
    • Alejandro Russo, John. Hughes, David Naumann, Andrei Sabelfeld: Closing Internal Timing Channels by Transformation. Proc. 11th Annual Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006.
    • (2006) Proc. 11th Annual Asian Computing Science Conference
    • Alejandro Russo, J.1
  • 18
    • 36448964581 scopus 로고    scopus 로고
    • Geoffrey Smith, Dennis Volpano. Secure Information Flow in a Multi-threaded Imperative Language. 1998 ACM 0-89791-979-3/98/01.
    • Geoffrey Smith, Dennis Volpano. Secure Information Flow in a Multi-threaded Imperative Language. 1998 ACM 0-89791-979-3/98/01.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.