메뉴 건너뛰기




Volumn 402, Issue 2-3, 2008, Pages 82-101

Cryptographically-masked flows

Author keywords

Cryptography; Information flow; Language based security; Noninterference; Security type systems

Indexed keywords

COMPUTER NETWORKS; INFORMATION SYSTEMS; INTEGER PROGRAMMING; MATHEMATICAL MODELS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; QUALITY ASSURANCE; RELIABILITY; STANDARDS;

EID: 46449131920     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2008.04.028     Document Type: Article
Times cited : (19)

References (38)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Abadi M. Secrecy by typing in security protocols. J. ACM 46 5 (1999) 749-786
    • (1999) J. ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 33749846305 scopus 로고    scopus 로고
    • Cryptographically-masked flows
    • Proc. Symp. on Static Analysis, Springer Verlag
    • Askarov A., Hedin D., and Sabelfeld A. Cryptographically-masked flows. Proc. Symp. on Static Analysis. LNCS (August 2006), Springer Verlag 353-369
    • (2006) LNCS , pp. 353-369
    • Askarov, A.1    Hedin, D.2    Sabelfeld, A.3
  • 3
    • 33646080360 scopus 로고    scopus 로고
    • Security-typed languages for implementation of cryptographic protocols: A case study
    • Proc. European Symp. on Research in Computer Security, Springer Verlag
    • Askarov A., and Sabelfeld A. Security-typed languages for implementation of cryptographic protocols: A case study. Proc. European Symp. on Research in Computer Security. LNCS vol. 3679 (September 2005), Springer Verlag 197-221
    • (2005) LNCS , vol.3679 , pp. 197-221
    • Askarov, A.1    Sabelfeld, A.2
  • 4
    • 34548715313 scopus 로고    scopus 로고
    • A. Askarov, A. Sabelfeld, Gradual release: Unifying declassification, encryption and key release policies, in: Proc. IEEE Symp. on Security and Privacy, May 2007, pp. 207-221
    • A. Askarov, A. Sabelfeld, Gradual release: Unifying declassification, encryption and key release policies, in: Proc. IEEE Symp. on Security and Privacy, May 2007, pp. 207-221
  • 5
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • Advances in Cryptology- Crypto 98
    • Bellare M., Desa A., Pointcheval D., and Rogaway P. Relations among notions of security for public-key encryption schemes. Advances in Cryptology- Crypto 98. LNCS vol. 1462 (January 1998) 26-46
    • (1998) LNCS , vol.1462 , pp. 26-46
    • Bellare, M.1    Desa, A.2    Pointcheval, D.3    Rogaway, P.4
  • 7
    • 35248822352 scopus 로고    scopus 로고
    • Encryption-scheme security in the presence of key-dependent messages
    • Selected Areas in Cryptography, Springer Verlag
    • Black J., Rogaway P., and Shrimpton T. Encryption-scheme security in the presence of key-dependent messages. Selected Areas in Cryptography. LNCS vol. 2595 (August 2002), Springer Verlag 62-75
    • (2002) LNCS , vol.2595 , pp. 62-75
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 10
    • 84942244044 scopus 로고    scopus 로고
    • T. Chothia, D. Duggan, J. Vitek, Type-based distributed access control, in: Proc. IEEE Computer Security Foundations Workshop, 2003, pp. 170-186
    • T. Chothia, D. Duggan, J. Vitek, Type-based distributed access control, in: Proc. IEEE Computer Security Foundations Workshop, 2003, pp. 170-186
  • 11
    • 46449098710 scopus 로고    scopus 로고
    • D. Clark, S. Hunt, Observation, nondeterminism and nondeducability on strategies. Workshop presentation at PLID'07, 3rd International Workshop on Programming Language Dependence and Independence, August 2007
    • D. Clark, S. Hunt, Observation, nondeterminism and nondeducability on strategies. Workshop presentation at PLID'07, 3rd International Workshop on Programming Language Dependence and Independence, August 2007
  • 12
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • DeMillo R.A., Dobkin D.P., Jones A.K., and Lipton R.J. (Eds), Academic Press
    • Cohen E.S. Information transmission in sequential programs. In: DeMillo R.A., Dobkin D.P., Jones A.K., and Lipton R.J. (Eds). Foundations of Secure Computation (1978), Academic Press 297-335
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 13
    • 0033718531 scopus 로고    scopus 로고
    • M. Dam, P. Giambiagi, Confidentiality for mobile code: The case of a simple payment protocol, in: Proc. IEEE Computer Security Foundations Workshop, July 2000, pp. 233-244
    • M. Dam, P. Giambiagi, Confidentiality for mobile code: The case of a simple payment protocol, in: Proc. IEEE Computer Security Foundations Workshop, July 2000, pp. 233-244
  • 14
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning D.E., and Denning P.J. Certification of programs for secure information flow. Comm. ACM 20 7 (July 1977) 504-513
    • (1977) Comm. ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 16
    • 35248815514 scopus 로고    scopus 로고
    • On the secure implementation of security protocols
    • Proc. European Symp. on Programming, Springer Verlag
    • Giambiagi P., and Dam M. On the secure implementation of security protocols. Proc. European Symp. on Programming. LNCS vol. 2618 (April 2003), Springer Verlag 144-158
    • (2003) LNCS , vol.2618 , pp. 144-158
    • Giambiagi, P.1    Dam, M.2
  • 18
    • 27244444891 scopus 로고    scopus 로고
    • A. Gordon, A. Jeffrey, Secrecy despite compromise: Types, cryptography, and the pi-calculus, Proc. CONCUR'05 Number 3653, LNCS, pp 186-201 Springer Verlag, August 2005
    • A. Gordon, A. Jeffrey, Secrecy despite compromise: Types, cryptography, and the pi-calculus, Proc. CONCUR'05 Number 3653, LNCS, pp 186-201 Springer Verlag, August 2005
  • 19
    • 46449122040 scopus 로고    scopus 로고
    • B. Hicks, D. King, P. McDaniel, Declassification with cryptographic functions in a security-typed language, Technical Report NAS-TR-0004-2005, Network and Security Center, Department of Computer Science, Pennsylvania State University, May 2005
    • B. Hicks, D. King, P. McDaniel, Declassification with cryptographic functions in a security-typed language, Technical Report NAS-TR-0004-2005, Network and Security Center, Department of Computer Science, Pennsylvania State University, May 2005
  • 20
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • Proc. European Symp. on Programming, Springer Verlag
    • Laud P. Semantics and program analysis of computationally secure information flow. Proc. European Symp. on Programming. LNCS vol. 2028 (April 2001), Springer Verlag 77-91
    • (2001) LNCS , vol.2028 , pp. 77-91
    • Laud, P.1
  • 21
    • 35248840989 scopus 로고    scopus 로고
    • Handling encryption in an analysis for secure information flow
    • Proc. European Symp. on Programming, Springer Verlag
    • Laud P. Handling encryption in an analysis for secure information flow. Proc. European Symp. on Programming. LNCS vol. 2618 (April 2003), Springer Verlag 159-173
    • (2003) LNCS , vol.2618 , pp. 159-173
    • Laud, P.1
  • 22
  • 23
    • 26844509701 scopus 로고    scopus 로고
    • P. Laud, V. Vene, A type system for computationally secure information flow, in: Proc. Fundamentals of Computation Theory, in: LNCS, vol. 3623, August 2005, pp. 365-377
    • P. Laud, V. Vene, A type system for computationally secure information flow, in: Proc. Fundamentals of Computation Theory, in: LNCS, vol. 3623, August 2005, pp. 365-377
  • 25
    • 0023829319 scopus 로고
    • Noninterference and the composability of security properties
    • McCullough D. Noninterference and the composability of security properties. Proc. IEEE Symp. on Security and Privacy (May 1988) 177-186
    • (1988) Proc. IEEE Symp. on Security and Privacy , pp. 177-186
    • McCullough, D.1
  • 26
    • 84945290421 scopus 로고    scopus 로고
    • Probabilistic polynomial-time process calculus and security protocol analysis
    • Proc. European Symp. on Programming, Springer Verlag
    • Mitchell J.C. Probabilistic polynomial-time process calculus and security protocol analysis. Proc. European Symp. on Programming. LNCS vol. 2028 (April 2001), Springer Verlag 23-29
    • (2001) LNCS , vol.2028 , pp. 23-29
    • Mitchell, J.C.1
  • 28
    • 33646177208 scopus 로고    scopus 로고
    • Enforcing robust declassification and qualified robustness
    • Myers A.C., Sabelfeld A., and Zdancewic S. Enforcing robust declassification and qualified robustness. J. Computer Security 14 2 (May 2006) 157-196
    • (2006) J. Computer Security , vol.14 , Issue.2 , pp. 157-196
    • Myers, A.C.1    Sabelfeld, A.2    Zdancewic, S.3
  • 29
    • 46449111289 scopus 로고    scopus 로고
    • National Institute of Standards and Technology. Special publication 800-38a. Recommendation for block cipher modes of operation, December 2001
    • National Institute of Standards and Technology. Special publication 800-38a. Recommendation for block cipher modes of operation, December 2001
  • 31
    • 35048828759 scopus 로고    scopus 로고
    • A model for delimited information release
    • Proc. International Symp. on Software Security (ISSS'03), Springer Verlag
    • Sabelfeld A., and Myers A.C. A model for delimited information release. Proc. International Symp. on Software Security (ISSS'03). LNCS vol. 3233 (October 2004), Springer Verlag 174-191
    • (2004) LNCS , vol.3233 , pp. 174-191
    • Sabelfeld, A.1    Myers, A.C.2
  • 32
    • 28144453799 scopus 로고    scopus 로고
    • A. Sabelfeld, D. Sands, Dimensions and principles of declassification, in: Proc. IEEE Computer Security Foundations Workshop, June 2005, pp. 255-269
    • A. Sabelfeld, D. Sands, Dimensions and principles of declassification, in: Proc. IEEE Computer Security Foundations Workshop, June 2005, pp. 255-269
  • 38
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Volpano D., Smith G., and Irvine C. A sound type system for secure flow analysis. J. Comput. Secur. 4 3 (1996) 167-187
    • (1996) J. Comput. Secur. , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.