메뉴 건너뛰기




Volumn , Issue , 2007, Pages 61-66

Towards a logical account of declassification

Author keywords

Aliasing; Confidentiality; Information flow

Indexed keywords

COMPUTATIONAL METHODS; CRYPTOGRAPHY; SECURITY OF DATA;

EID: 36448951937     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1255329.1255340     Document Type: Conference Paper
Times cited : (11)

References (27)
  • 2
    • 34548715313 scopus 로고    scopus 로고
    • Gradual release: Unifying declassification, encryption and key release policies
    • May
    • A. Askarov and A. Sabelfeld. Gradual release: Unifying declassification, encryption and key release policies. In Proc. IEEE Symp. on Security and Privacy, May 2007.
    • (2007) Proc. IEEE Symp. on Security and Privacy
    • Askarov, A.1    Sabelfeld, A.2
  • 4
    • 33745794062 scopus 로고    scopus 로고
    • Flow locks: Towards a core calculus for dynamic flow policies
    • Proc. European Symp. on Programming, of, Springer-Verlag
    • N. Broberg and D. Sands. Flow locks: Towards a core calculus for dynamic flow policies. In Proc. European Symp. on Programming, volume 3924 of LNCS, pages 180-196. Springer-Verlag, 2006.
    • (2006) LNCS , vol.3924 , pp. 180-196
    • Broberg, N.1    Sands, D.2
  • 6
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Academic Press
    • E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 8
    • 2442507870 scopus 로고    scopus 로고
    • Abstract non-interference: Parameterizing non-interference by abstract interpretation
    • January
    • R. Giacobazzi and I. Mastroeni. Abstract non-interference: Parameterizing non-interference by abstract interpretation. In Proc. ACM Symp. on Principles of Programming Languages, pages 186-197, January 2004.
    • (2004) Proc. ACM Symp. on Principles of Programming Languages , pp. 186-197
    • Giacobazzi, R.1    Mastroeni, I.2
  • 9
    • 24644453685 scopus 로고    scopus 로고
    • Adjoining declassification and attack models by abstract interpretation
    • Proc. European Symp. on Programming, of, Springer-Verlag, April
    • R. Giacobazzi and I. Mastroeni. Adjoining declassification and attack models by abstract interpretation. In Proc. European Symp. on Programming, volume 3444 of LNCS, pages 295-310. Springer-Verlag, April 2005.
    • (2005) LNCS , vol.3444 , pp. 295-310
    • Giacobazzi, R.1    Mastroeni, I.2
  • 10
    • 0033751850 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • R. Joshi and K. R. M. Leino. A semantic approach to secure information flow. Science of Computer Programming, 37(1-3):113-138, 2000.
    • (2000) Science of Computer Programming , vol.37 , Issue.1-3 , pp. 113-138
    • Joshi, R.1    Leino, K.R.M.2
  • 12
    • 84881123660 scopus 로고    scopus 로고
    • Information flow control and applications-Bridging a gap
    • Proc. Formal Methods Europe, of, Springer-Verlag, March
    • H. Mantel. Information flow control and applications-Bridging a gap. In Proc. Formal Methods Europe, volume 2021 of LNCS, pages 153-172. Springer-Verlag, March 2001.
    • (2001) LNCS , vol.2021 , pp. 153-172
    • Mantel, H.1
  • 13
    • 37149055443 scopus 로고    scopus 로고
    • Controlling the what and where of declassification in language-based security
    • Proc. European Symp. on Programming, of, Springer-Verlag
    • H. Mantel and A. Reinhard. Controlling the what and where of declassification in language-based security. In Proc. European Symp. on Programming, volume 4421 of LNCS, pages 141-156. Springer-Verlag, 2007.
    • (2007) LNCS , vol.4421 , pp. 141-156
    • Mantel, H.1    Reinhard, A.2
  • 14
    • 35048815139 scopus 로고    scopus 로고
    • Controlled downgrading based on intransitive (non)interference
    • Proc. Asian Symp. on Programming Languages and Systems, of, Springer-Verlag, November
    • H. Mantel and D. Sands. Controlled downgrading based on intransitive (non)interference. In Proc. Asian Symp. on Programming Languages and Systems, volume 3302 of LNCS, pages 129-145. Springer-Verlag, November 2004.
    • (2004) LNCS , vol.3302 , pp. 129-145
    • Mantel, H.1    Sands, D.2
  • 15
    • 0042361083 scopus 로고    scopus 로고
    • Non-deterministic admissible interference
    • J. Mullins. Non-deterministic admissible interference. J. of Universal Computer Science, 6(11): 1054-1070, 2000.
    • (2000) J. of Universal Computer Science , vol.6 , Issue.11 , pp. 1054-1070
    • Mullins, J.1
  • 16
    • 0029228214 scopus 로고
    • Absorbing covers and intransitive non-interference
    • May
    • S. Pinsky. Absorbing covers and intransitive non-interference. In Proc. IEEE Symp. on Security and Privacy, pages 102-113, May 1995.
    • (1995) Proc. IEEE Symp. on Security and Privacy , pp. 102-113
    • Pinsky, S.1
  • 20
    • 0003502331 scopus 로고    scopus 로고
    • Noninterference, transitivity, and channel-control security policies
    • Technical Report CSL-92-02, SRI International, 1992
    • J. M. Rushby. Noninterference, transitivity, and channel-control security policies. Technical Report CSL-92-02, SRI International, 1992.
    • Rushby, J.M.1
  • 22
    • 35048828759 scopus 로고    scopus 로고
    • A model for delimited information release
    • Proc. International Symp. on Software Security ISSS'03, of, Springer-Verlag, October
    • A. Sabelfeld and A. C. Myers. A model for delimited information release. In Proc. International Symp. on Software Security (ISSS'03), volume 3233 of LNCS, pages 174-191. Springer-Verlag, October 2004.
    • (2004) LNCS , vol.3233 , pp. 174-191
    • Sabelfeld, A.1    Myers, A.C.2
  • 23
    • 0035276729 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • March
    • A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher Order and Symbolic Computation, 14(1):59-91, March 2001.
    • (2001) Higher Order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 25
    • 34548754820 scopus 로고    scopus 로고
    • Declassification: Dimensions and principles
    • To appear
    • A. Sabelfeld and D. Sands. Declassification: Dimensions and principles. J. Computer Security, 2007. To appear.
    • (2007) J. Computer Security
    • Sabelfeld, A.1    Sands, D.2
  • 26
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3): 167-187, 1996.
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.