메뉴 건너뛰기




Volumn 5014 LNCS, Issue , 2008, Pages 229-245

Specification and checking of software contracts for conditional information flow

Author keywords

[No Author keywords available]

Indexed keywords

AIRCRAFT LANDING SYSTEMS; CONTRACTS; ELECTRIC SPARKS; FORMAL LOGIC; SPECIFICATIONS;

EID: 47249138713     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-68237-0_17     Document Type: Conference Paper
Times cited : (24)

References (27)
  • 2
    • 35048839749 scopus 로고    scopus 로고
    • Amtoft, T., Banerjee, A.: Information Flow Analysis in Logical Form. In: Giacobazzi, R. (ed.) SAS 2004. LNCS, 3148, pp. 100-115. Springer, Heidelberg (2004)
    • Amtoft, T., Banerjee, A.: Information Flow Analysis in Logical Form. In: Giacobazzi, R. (ed.) SAS 2004. LNCS, vol. 3148, pp. 100-115. Springer, Heidelberg (2004)
  • 3
    • 33751073715 scopus 로고    scopus 로고
    • Amtoft, T., Banerjee, A.: A logic for information flow analysis with an application to forward slicing of simple imperative programs. Science of Comp. Prog. 64(1), 3-28 (2007)
    • Amtoft, T., Banerjee, A.: A logic for information flow analysis with an application to forward slicing of simple imperative programs. Science of Comp. Prog. 64(1), 3-28 (2007)
  • 4
    • 58049149107 scopus 로고    scopus 로고
    • Amtoft, T., Banerjee, A.: Verification condition generation for conditional information flow. In: 5th ACM Workshop on Formal Methods in Security Engineering (FMSE), pp. 2-11 (2007); A long version, with proofs, appears as technical report KSU CIS TR 2007-2
    • Amtoft, T., Banerjee, A.: Verification condition generation for conditional information flow. In: 5th ACM Workshop on Formal Methods in Security Engineering (FMSE), pp. 2-11 (2007); A long version, with proofs, appears as technical report KSU CIS TR 2007-2
  • 5
    • 47249131553 scopus 로고    scopus 로고
    • Amtoft, T., Hatcliff, J., Rodriguez, E., Robby, Hoag, J., Greve, D.: Specification and checking of software contracts for conditional information flow (extended version). Technical Report SAnToS-TR2007-5, KSU CIS (2007), http://www.sireum.org
    • Amtoft, T., Hatcliff, J., Rodriguez, E., Robby, Hoag, J., Greve, D.: Specification and checking of software contracts for conditional information flow (extended version). Technical Report SAnToS-TR2007-5, KSU CIS (2007), http://www.sireum.org
  • 6
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based access control and secure information flow
    • Banerjee, A., Naumann, D.A.: Stack-based access control and secure information flow. Journal of Functional Programming 2(15), 131-177 (2005)
    • (2005) Journal of Functional Programming , vol.2 , Issue.15 , pp. 131-177
    • Banerjee, A.1    Naumann, D.A.2
  • 9
    • 84976850518 scopus 로고
    • Information-flow and data-flow analysis of while-programs
    • Bergeretti, J.-F., Carré, B.A.: Information-flow and data-flow analysis of while-programs. ACM TOPLAS 7(1), 37-61 (1985)
    • (1985) ACM TOPLAS , vol.7 , Issue.1 , pp. 37-61
    • Bergeretti, J.-F.1    Carré, B.A.2
  • 10
    • 19544375598 scopus 로고    scopus 로고
    • Chapman, R., Hilton, A.: Enforcing security and safety models with an information flow analysis tool. In: SIGAda 2004, Atlanta, Georgia, November 2004, pp. 39-46. ACM, New York (2004)
    • Chapman, R., Hilton, A.: Enforcing security and safety models with an information flow analysis tool. In: SIGAda 2004, Atlanta, Georgia, November 2004, pp. 39-46. ACM, New York (2004)
  • 11
    • 24644445710 scopus 로고    scopus 로고
    • Darvas, A., Hähnle, R., Sands, D.: A theorem proving approach to analysis of secure information flow. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, 3450, pp. 193-209. Springer, Heidelberg (2005)
    • Darvas, A., Hähnle, R., Sands, D.: A theorem proving approach to analysis of secure information flow. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 193-209. Springer, Heidelberg (2005)
  • 15
    • 84991042142 scopus 로고    scopus 로고
    • Jackson, D, Thomas, M, Millett, L.I, eds, National Academies Press, Washington , Committee on Certifiably Dependable Software Systems, National Research Council
    • Jackson, D., Thomas, M., Millett, L.I. (eds.): Software for Dependable Systems: Sufficient Evidence? National Academies Press, Washington (2007); Committee on Certifiably Dependable Software Systems, National Research Council
    • (2007) Software for Dependable Systems: Sufficient Evidence
  • 17
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • San Antonio, Texas, pp, ACM Press, New York
    • Myers, A.C.: JFlow: Practical mostly-static information flow control. In: POPL 1999, San Antonio, Texas, pp. 228-241. ACM Press, New York (1999)
    • (1999) POPL , pp. 228-241
    • Myers, A.C.1
  • 18
    • 33750232981 scopus 로고    scopus 로고
    • From Coupling Relations to Mated Invariants for Checking Information Flow
    • Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
    • Naumann, J.D.A.: From Coupling Relations to Mated Invariants for Checking Information Flow. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 279-296. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4189 , pp. 279-296
    • Naumann, J.D.A.1
  • 19
    • 84944677742 scopus 로고    scopus 로고
    • Owre, S., Rushby, J.M., Shankar, N.: PVS: A prototype verification system. In: Kapur, D. (ed.) CADE 1992. LNCS, 607, Springer, Heidelberg (1992)
    • Owre, S., Rushby, J.M., Shankar, N.: PVS: A prototype verification system. In: Kapur, D. (ed.) CADE 1992. LNCS, vol. 607, Springer, Heidelberg (1992)
  • 21
    • 85041481084 scopus 로고    scopus 로고
    • Rushby, J.: The design and verification of secure systems. In: 8th ACM Symposium on Operating Systems Principles, 15(5), pp. 12-21 (1981)
    • Rushby, J.: The design and verification of secure systems. In: 8th ACM Symposium on Operating Systems Principles, vol. 15(5), pp. 12-21 (1981)
  • 22
    • 47249103755 scopus 로고    scopus 로고
    • Simonet, V.: Flow Caml in a nutshell. In: Hutton, G. (ed.) First APPSEM-II workshop, March 2003, pp. 152-165 (2003)
    • Simonet, V.: Flow Caml in a nutshell. In: Hutton, G. (ed.) First APPSEM-II workshop, March 2003, pp. 152-165 (2003)
  • 23
    • 33750912954 scopus 로고    scopus 로고
    • Efficient path conditions in dependence graphs for software safety analysis
    • Snelting, G., Robschink, T., Krinke, J.: Efficient path conditions in dependence graphs for software safety analysis. ACM TOSEM 15(4), 410-457 (2006)
    • (2006) ACM TOSEM , vol.15 , Issue.4 , pp. 410-457
    • Snelting, G.1    Robschink, T.2    Krinke, J.3
  • 24
    • 33646037706 scopus 로고    scopus 로고
    • Terauchi, T., Aiken, A.: Secure information flow as a safety problem. In: Hankin, C., Siveroni, I. (eds.) SAS 2005. LNCS, 3672, pp. 352-367. Springer, Heidelberg (2005)
    • Terauchi, T., Aiken, A.: Secure information flow as a safety problem. In: Hankin, C., Siveroni, I. (eds.) SAS 2005. LNCS, vol. 3672, pp. 352-367. Springer, Heidelberg (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.