메뉴 건너뛰기




Volumn 17, Issue , 2004, Pages 187-201

Modelling downgrading in information flow security

Author keywords

[No Author keywords available]

Indexed keywords

FLOW SECURITY; FORMAL THEORY; REAL SYSTEMS; SECURITY LEVELS;

EID: 4944242009     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (39)

References (21)
  • 4
    • 34249893892 scopus 로고    scopus 로고
    • Compositional Action Refinement and Information Flow Security
    • Dipartimento di Informatica, Università Ca' Foscari di Venezia, Italy
    • A. Bossi, D. Macedonio, C. Piazza, and S. Rosssi. Compositional Action Refinement and Information Flow Security. Technical Report CS-2003-13, Dipartimento di Informatica, Università Ca' Foscari di Venezia, Italy, 2003.
    • (2003) Technical Report CS-2003-13 , vol.CS-2003-13
    • Bossi, A.1    Macedonio, D.2    Piazza, C.3    Rosssi, S.4
  • 5
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (Part I: Information flow)
    • Volume 2171 of LNCS. In R. Focardi and R. Gorrieri, editors. Springer-Verlag
    • R. Focardi and R. Gorrieri. Classification of Security Properties (Part I: Information Flow). In R. Focardi and R. Gorrieri, editors, Proc. of Foundations of Security Analysis and Design (FOSAD'01), volume 2171 of LNCS, pages 331-396. Springer-Verlag, 2001.
    • (2001) Proc. of Foundations of Security Analysis and Design (FOSAD'01) , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 11
    • 4944237116 scopus 로고    scopus 로고
    • Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols
    • S. Lafrance and J. Mullins. Bisimulation-based Non-deterministic Admissible Interference and its Application to the Analysis of Cryptographic Protocols. Electronic Notes in Theoretical Computer Science, 61:1-24, 2002.
    • (2002) Electronic Notes in Theoretical Computer Science , vol.61 , pp. 1-24
    • Lafrance, S.1    Mullins, J.2
  • 15
    • 0042361083 scopus 로고    scopus 로고
    • Nondeterministic admissible interference
    • J. Mullins. Nondeterministic Admissible Interference. Journal of Universal Computer Science, 11:1054-1070, 2000.
    • (2000) Journal of Universal Computer Science , vol.11 , pp. 1054-1070
    • Mullins, J.1
  • 17
    • 0029228214 scopus 로고
    • Absorbing covers and intransitive noninterference
    • IEEE Computer Society Press
    • S. Pinsky. Absorbing Covers and Intransitive Noninterference. In Proc. of the IEEE Symposium on Security and Privacy (SSP'95), pages 102-113. IEEE Computer Society Press, 1995.
    • (1995) Proc. of the IEEE Symposium on Security and Privacy (SSP'95) , pp. 102-113
    • Pinsky, S.1
  • 19
    • 0003502331 scopus 로고
    • Noninterference, transitivity, and channel-control security policies
    • SRI International, December
    • J. Rushby. Noninterference, transitivity, and channel-control security policies. Technical Report CSL-92-02, SRI International, December 1992.
    • (1992) Technical Report CSL-92-02 , vol.CSL-92-02
    • Rushby, J.1
  • 20
    • 0035067847 scopus 로고    scopus 로고
    • Process algebra and noninterference
    • P. Ryan and S. Schneider. Process Algebra and Noninterference. Journal of Computer Security, 9(1/2):75-103, 2001.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 75-103
    • Ryan, P.1    Schneider, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.