메뉴 건너뛰기




Volumn 4435 LNCS, Issue , 2007, Pages 75-89

Automata-based confidentiality monitoring

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; AUTOMATA THEORY; CANNING; COMPUTER SCIENCE; MECHANISMS; PUBLIC POLICY; ROBOTS; TECHNOLOGY; TRANSLATION (LANGUAGES);

EID: 49949102660     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77505-8_7     Document Type: Conference Paper
Times cited : (80)

References (29)
  • 2
    • 84976675687 scopus 로고
    • Information Transmission in Computational Systems
    • Cohen, E.S.: Information Transmission in Computational Systems. ACM SIGOPS Operating Systems Review 11(5), 133-139 (1977)
    • (1977) ACM SIGOPS Operating Systems Review , vol.11 , Issue.5 , pp. 133-139
    • Cohen, E.S.1
  • 4
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based Access Control and Secure Information Flow
    • Banerjee, A., Naumann, D.A.: Stack-based Access Control and Secure Information Flow. Journal of Functional Programming 15(2), 131-177 (2005)
    • (2005) Journal of Functional Programming , vol.15 , Issue.2 , pp. 131-177
    • Banerjee, A.1    Naumann, D.A.2
  • 8
    • 84957671171 scopus 로고    scopus 로고
    • Partial evaluation and non-interference for object calculi
    • Middeldorp, A, ed, FLOPS 1999, Springer, Heidelberg
    • Barthe, C., Serpette, B.: Partial evaluation and non-interference for object calculi. In: Middeldorp, A. (ed.) FLOPS 1999. LNCS, vol. 1722, pp. 53-67. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1722 , pp. 53-67
    • Barthe, C.1    Serpette, B.2
  • 9
    • 0035276729 scopus 로고    scopus 로고
    • A Per Model of Secure Information Flow in Sequential Programs
    • Sabelfeld, A., Sands, D.: A Per Model of Secure Information Flow in Sequential Programs. Higher Order and Symbolic Computation 14(1), 59-91 (2001)
    • (2001) Higher Order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 10
    • 0000046942 scopus 로고    scopus 로고
    • Mizuno, M., Schmidt, D.: A Security Flow Control Algorithm and Its Denotational Semantics Correctness Proof. J. Formal Aspects of Comp. 4(6A). 727-754 (1992)
    • Mizuno, M., Schmidt, D.: A Security Flow Control Algorithm and Its Denotational Semantics Correctness Proof. J. Formal Aspects of Comp. 4(6A). 727-754 (1992)
  • 11
    • 0030370740 scopus 로고    scopus 로고
    • A Sound Type System for Secure Flow Analysis
    • Volpano, D., Smith, G., Irvine, C.: A Sound Type System for Secure Flow Analysis. J. Computer Security 4(3). 167-187 (1996)
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 13
    • 49949098887 scopus 로고    scopus 로고
    • Le Guernic, G., Banerjee, A., Schmidt, D.: Automaton-based Non-interference Monitoring. Technical Report, -1, Kansas State University. Manhattan. KS. USA (April 2006) (2006), http://www.cis.ksu.edu/schmidt/ techreport/2006.list.html
    • Le Guernic, G., Banerjee, A., Schmidt, D.: Automaton-based Non-interference Monitoring. Technical Report, -1, Kansas State University. Manhattan. KS. USA (April 2006) (2006), http://www.cis.ksu.edu/schmidt/ techreport/2006.list.html
  • 14
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1). 30-50 (2000)
    • (2000) ACM Trans. Inf. Syst. Secur , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 15
    • 0028058408 scopus 로고
    • A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions
    • McLean, J.: A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions. In: Proc. Symp. Security and Privacy, pp. 79-93 (1994)
    • (1994) Proc. Symp. Security and Privacy , pp. 79-93
    • McLean, J.1
  • 18
    • 84958790465 scopus 로고
    • Natural Semantics
    • Brandenburg, F.J, Wirsing, M, Vidal-Naquet. G, eds, STACS, 247. pp, Springer. Heidelberg
    • Kahn, G.: Natural Semantics. In: Brandenburg, F.J., Wirsing, M., Vidal-Naquet. G. (eds.) STACS 87. LNCS, vol. 247. pp. 22-39. Springer. Heidelberg (1987)
    • (1987) LNCS , vol.87 , pp. 22-39
    • Kahn, G.1
  • 19
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Sec 4(1-2). 2-16 (2005)
    • (2005) Int. J. Inf. Sec , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 20
    • 49949100272 scopus 로고    scopus 로고
    • Viswanathan. M, Foundations for the Run-time Analysis of Software Systems. PhD thesis. University of Pennsylvania December
    • Viswanathan. M.: Foundations for the Run-time Analysis of Software Systems. PhD thesis. University of Pennsylvania (December 2000)
    • (2000)
  • 21
    • 0031648455 scopus 로고    scopus 로고
    • Smith, C. Volpano, D.: Secure Information Flow in a Multi-threaded Imperative Language. In: Proc. ACM Symp. on Principles of Programming Languages (January 1998). pp. 355-364 (1998)
    • Smith, C. Volpano, D.: Secure Information Flow in a Multi-threaded Imperative Language. In: Proc. ACM Symp. on Principles of Programming Languages (January 1998). pp. 355-364 (1998)
  • 22
    • 0012889295 scopus 로고    scopus 로고
    • A Language-Based Approach to Security
    • Wilhelm, K, ed, Informatics, Springer. Heidelberg
    • Schneider, F.B., Morrisett, C., Harper, R.: A Language-Based Approach to Security. In: Wilhelm, K. (ed.) Informatics. LNCS, vol. 2000. pp. 86-101. Springer. Heidelberg (2001)
    • (2001) LNCS , vol.2000 , pp. 86-101
    • Schneider, F.B.1    Morrisett, C.2    Harper, R.3
  • 24
    • 0033489650 scopus 로고    scopus 로고
    • SASI Enforcement of Security Policies: A Retrospective
    • ACM Press. New-York
    • Erlingsson, U., Schneider, F.B.: SASI Enforcement of Security Policies: A Retrospective. In: Proc. New Security Paradigms Workshop, pp. 87-95. ACM Press. New-York (1999)
    • (1999) Proc. New Security Paradigms Workshop , pp. 87-95
    • Erlingsson, U.1    Schneider, F.B.2
  • 26
    • 33646066871 scopus 로고    scopus 로고
    • Ligatti, J., Bauer, L., Walker, D.: Enforcing Non-safety Security Policies with Program Monitors. In: di Vimercati. S.d.C., Syverson, P.F., Gollmann, D. (eds.) ES-ORICS 2005. LNCS. 3679, pp. 355-373. Springer. Heidelberg (2005)
    • Ligatti, J., Bauer, L., Walker, D.: Enforcing Non-safety Security Policies with Program Monitors. In: di Vimercati. S.d.C., Syverson, P.F., Gollmann, D. (eds.) ES-ORICS 2005. LNCS. vol. 3679, pp. 355-373. Springer. Heidelberg (2005)
  • 28
    • 49949096881 scopus 로고    scopus 로고
    • Le Guernic, C. Jensen, T.: Monitoring Information Flow. In: Proceedings of the Workshop on Foundations of Computer Security (June 2005). pp. 19-30. DePaul University (2005)
    • Le Guernic, C. Jensen, T.: Monitoring Information Flow. In: Proceedings of the Workshop on Foundations of Computer Security (June 2005). pp. 19-30. DePaul University (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.