메뉴 건너뛰기




Volumn 99, Issue , 2004, Pages 127-154

Unwinding in information flow security

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRA; COMPUTER PROGRAMMING LANGUAGES; COMPUTER SIMULATION; CRYPTOGRAPHY; INFORMATION ANALYSIS; NETWORK PROTOCOLS;

EID: 4944265912     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2004.02.006     Document Type: Article
Times cited : (22)

References (37)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Martín Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 3042529082 scopus 로고    scopus 로고
    • A Process-algebraic Approach for the Analysis of Probabilistic Non-interference
    • To appear
    • A. Aldini, M. Bravetti, and R. Gorrieri. A Process-algebraic Approach for the Analysis of Probabilistic Non-interference. Journal of Computer Security, 2004. To appear.
    • (2004) Journal of Computer Security
    • Aldini, A.1    Bravetti, M.2    Gorrieri, R.3
  • 3
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • MITRE MTR-2997
    • D. E. Bell and L. J. La Padula. Secure computer systems: Unified exposition and multics interpretation. Technical Report ESD-TR-75-306, MITRE MTR-2997, 1975.
    • (1975) Technical Report , vol.ESD-TR-75-306
    • Bell, D.E.1    La Padula, L.J.2
  • 5
    • 84937553676 scopus 로고    scopus 로고
    • Static analysis for secrecy and non-interference in networks of processes
    • Victor E. Malyshkin, editor, Proc. of International Conference on Parallel Computing Technologies. Springer-Verlag
    • C. Bodei, P. Degano, F. Nielson, and H. Riis Nielson. Static analysis for secrecy and non-interference in networks of processes. In Victor E. Malyshkin, editor, Proc. of International Conference on Parallel Computing Technologies, volume 2127 of Lecture Notes in Computer Science, pages 27-41. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2127 , pp. 27-41
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Nielson, H.R.4
  • 6
    • 84944047063 scopus 로고    scopus 로고
    • Transforming processes to ensure and check information flow security
    • H. Kirchner and C. Ringeissen, editors, Int. Conference on Algebraic Methodology and Software Technology (AMAST'02). Springer-Verlag
    • A. Bossi, R. Focardi, C. Piazza, and S. Rossi. Transforming Processes to Ensure and Check Information Flow Security. In H. Kirchner and C. Ringeissen, editors, Int. Conference on Algebraic Methodology and Software Technology (AMAST'02), volume 2422 of LNCS, pages 271-286. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2422 , pp. 271-286
    • Bossi, A.1    Focardi, R.2    Piazza, C.3    Rossi, S.4
  • 7
    • 35248883450 scopus 로고    scopus 로고
    • A proof system for information flow security
    • M. Leuschel, editor, Logic Based Program Development and Transformation. Springer-Verlag
    • A. Bossi, R. Focardi, C. Piazza, and S. Rossi. A Proof System for Information Flow Security. In M. Leuschel, editor, Logic Based Program Development and Transformation, volume 2664 of LNCS, pages 199-218. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2664 , pp. 199-218
    • Bossi, A.1    Focardi, R.2    Piazza, C.3    Rossi, S.4
  • 10
    • 0142218855 scopus 로고    scopus 로고
    • Information flow security and recursive systems
    • Proc. of the Italian Conference on Theoretical Computer Science (ICTCS'03). Springer-Verlag
    • A. Bossi, D. Macedonio, C. Piazza, and S. Rossi. Information Flow Security and Recursive Systems. In Proc. of the Italian Conference on Theoretical Computer Science (ICTCS'03), volume 2841 of LNCS, pages 369-382. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2841 , pp. 369-382
    • Bossi, A.1    Macedonio, D.2    Piazza, C.3    Rossi, S.4
  • 11
    • 84877738879 scopus 로고    scopus 로고
    • Communication interference in mobile boxed ambients
    • M. Agrawal and A. Seth, editors, Proc. of Int. Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'02). Springer-Verlag
    • M. Bugliesi, S. Crafa, M. Merro, and V. Sassone. Communication Interference in Mobile Boxed Ambients. In M. Agrawal and A. Seth, editors, Proc. of Int. Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'02), volume 2556 of LNCS, pages 71-84. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2556 , pp. 71-84
    • Bugliesi, M.1    Crafa, S.2    Merro, M.3    Sassone, V.4
  • 13
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • R. Focardi and R. Gorrieri. A Classification of Security Properties for Process Algebras. Journal of Computer Security, 3(1):5-33, 1994/1995.
    • (1994) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 14
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (part I: Information flow)
    • R. Focardi and R. Gorrieri, editors, Proc. of Foundations of Security Analysis and Design (FOSAD'01). Springer-Verlag
    • R. Focardi and R. Gorrieri. Classification of Security Properties (Part I: Information Flow). In R. Focardi and R. Gorrieri, editors, Proc. of Foundations of Security Analysis and Design (FOSAD'01), volume 2171 of LNCS, pages 331-396. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 16
    • 84974597207 scopus 로고    scopus 로고
    • Non interference for the analysis of cryptographic protocols
    • U. Montanari, J. D. P. Rolim, and E. Welzl, editors, Proc. of Int. Colloquium on Automata, Languages and Programming (ICALP'00). Springer-Verlag
    • R. Focardi, R. Gorrieri, and F. Martinelli. Non Interference for the Analysis of Cryptographic Protocols. In U. Montanari, J. D. P. Rolim, and E. Welzl, editors, Proc. of Int. Colloquium on Automata, Languages and Programming (ICALP'00), volume 1853 of LNCS, pages 744-755. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1853 , pp. 744-755
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 21
    • 35248873844 scopus 로고    scopus 로고
    • A simple language for real-time cryptographic protocol analysis
    • P. Degano, editor, Proc. of European Symposium on Programming (ESOP'03). Springer-Verlag
    • R. Gorrieri, E. Locatelli, and F. Martinelli. A simple language for real-time cryptographic protocol analysis. In P. Degano, editor, Proc. of European Symposium on Programming (ESOP'03), volume 2618 of LNCS, pages 114-128. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2618 , pp. 114-128
    • Gorrieri, R.1    Locatelli, E.2    Martinelli, F.3
  • 23
    • 84944059120 scopus 로고    scopus 로고
    • Unwinding possibilistic security properties
    • Proc. of the European Symposium on Research in Computer Security (ESoRiCS'00). Springer-Verlag
    • H. Mantel. Unwinding Possibilistic Security Properties. In Proc. of the European Symposium on Research in Computer Security (ESoRiCS'00), volume 2895 of LNCS, pages 238-254. Springer-Verlag, 2000.
    • (2000) LNCS , vol.2895 , pp. 238-254
    • Mantel, H.1
  • 24
    • 0031645024 scopus 로고    scopus 로고
    • Partial model checking and theorem proving for ensuring security properties
    • IEEE Computer Society Press
    • F. Martinelli. Partial Model Checking and Theorem Proving for Ensuring Security Properties. In Proc. of the IEEE Computer Security Foundations Workshop (CSFW'98), pages 44-52. IEEE Computer Society Press, 1998.
    • (1998) Proc. of the IEEE Computer Security Foundations Workshop (CSFW'98) , pp. 44-52
    • Martinelli, F.1
  • 28
    • 84969347374 scopus 로고
    • CCS dynamic bisimulation is progressing
    • Proc. of the Int. Symposium on Mathematical Foundations of Computer Science (MFCS'91). Springer-Verlag
    • U. Montanari and V. Sassone. CCS Dynamic Bisimulation is Progressing. In Proc. of the Int. Symposium on Mathematical Foundations of Computer Science (MFCS'91), volume 520 of LNCS, pages 346-356. Springer-Verlag, 1991.
    • (1991) LNCS , vol.520 , pp. 346-356
    • Montanari, U.1    Sassone, V.2
  • 31
    • 0003142759 scopus 로고
    • A CSP formulation of non-interference and unwinding
    • P. Y. A. Ryan. A CSP Formulation of Non-Interference and Unwinding. Cipher, pages 19-27, 1991.
    • (1991) Cipher , pp. 19-27
    • Ryan, P.Y.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.