메뉴 건너뛰기




Volumn 4435 LNCS, Issue , 2007, Pages 120-135

Closing internal timing channels by transformation

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; INFORMATION RETRIEVAL SYSTEMS; MULTITASKING; TECHNOLOGY;

EID: 49949108946     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77505-8_10     Document Type: Conference Paper
Times cited : (30)

References (31)
  • 1
    • 49949084633 scopus 로고    scopus 로고
    • Report on resource and information flow security requirements, Deliverable D1.1 of the EU 1ST FET GC2 MOBIUS project. (March 2006), http://mobius.inria.fr/
    • Report on resource and information flow security requirements, Deliverable D1.1 of the EU 1ST FET GC2 MOBIUS project. (March 2006), http://mobius.inria.fr/
  • 2
    • 0033702592 scopus 로고    scopus 로고
    • Transforming out timing leaks
    • January
    • Agat, J.: Transforming out timing leaks. In: Proc. POPL 2002, pp. 40-53 (January 2000)
    • (2000) Proc. POPL 2002 , pp. 40-53
    • Agat, J.1
  • 3
    • 84879520825 scopus 로고    scopus 로고
    • Noninterference for concurrent programs
    • Orejas, F, Spirakis, P.G, van Leeuwen, J, eds, ICALP 2001, Springer. Heidelberg
    • Boudol, G., Castellani, I.: Noninterference for concurrent programs. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol. 2076, pp. 382-395. Springer. Heidelberg (2001)
    • (2001) LNCS , vol.2076 , pp. 382-395
    • Boudol, G.1    Castellani, I.2
  • 4
    • 0037014243 scopus 로고    scopus 로고
    • Non-interference for concurrent programs and thread systems
    • Boudol, G., Castellani, I.: Non-interference for concurrent programs and thread systems. Theoretical Computer Science 281(1). 109-130 (2002)
    • (2002) Theoretical Computer Science , vol.281 , Issue.1 , pp. 109-130
    • Boudol, G.1    Castellani, I.2
  • 5
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM 20(7), 504-513 (1977)
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 6
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (part I: Information flow)
    • Focardi, R, Gorrieri, R, eds, Foundations of Security Analysis and Design, Springer. Heidelberg
    • Focardi, R., Gorrieri, R.: Classification of security properties (part I: Information flow). In: Focardi, R., Gorrieri, R. (eds.) Foundations of Security Analysis and Design. LNCS, vol. 2171, pp. 331-396. Springer. Heidelberg (2001)
    • (2001) LNCS , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 7
    • 84947269249 scopus 로고    scopus 로고
    • Secure information flow as typed process behaviour
    • Smolka, G, ed, ESOP 2000 and ETAPS 2000, Springer, Heidelberg
    • Honda, K., Vasconcelos, V., Yoshida, N.: Secure information flow as typed process behaviour. In: Smolka, G. (ed.) ESOP 2000 and ETAPS 2000. LNCS, vol. 1782, Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1782
    • Honda, K.1    Vasconcelos, V.2    Yoshida, N.3
  • 9
    • 33947616857 scopus 로고    scopus 로고
    • Huisman, M., Worah, P., Sunesen, K.: A temporal logic characterisation of observational determinism. In: Proc. IEEE Computer Security Foundations Workshop (July 2006)
    • Huisman, M., Worah, P., Sunesen, K.: A temporal logic characterisation of observational determinism. In: Proc. IEEE Computer Security Foundations Workshop (July 2006)
  • 10
    • 49949090106 scopus 로고    scopus 로고
    • JSR 118 Expert Group, version 2.0. Java specification request, Java Community Process November
    • JSR 118 Expert Group. Mobile information device profile (MIDP). version 2.0. Java specification request, Java Community Process (November 2002)
    • (2002) Mobile information device profile (MIDP)
  • 12
    • 33947663590 scopus 로고    scopus 로고
    • Networking, user experience, and threads
    • Knudsen, J.: Networking, user experience, and threads. Sun Technical Articles and Tips, (2002), http://developers.sun.com/techtopics/mobility/midp/ articles/threading/
    • (2002) Sun Technical Articles and Tips
    • Knudsen, J.1
  • 13
    • 33745678531 scopus 로고    scopus 로고
    • Köpf, B., Mantel, H.: Eliminating implicit information leaks by transformational typing and unification. In: Dimitrakos, T., Martinelli. F., Ryan, P.Y.A., Schneider. S. (eds.) FAST 2005. LNCS, 3866, Springer, Heidelberg (2006)
    • Köpf, B., Mantel, H.: Eliminating implicit information leaks by transformational typing and unification. In: Dimitrakos, T., Martinelli. F., Ryan, P.Y.A., Schneider. S. (eds.) FAST 2005. LNCS, vol. 3866, Springer, Heidelberg (2006)
  • 14
    • 33947668912 scopus 로고    scopus 로고
    • Preventing screen lockups of blocking operations
    • Mahmoud, Q.H.: Preventing screen lockups of blocking operations. Sun Technical Articles and Tips (2004). http://developers.sun.com/techtopics/ mobility/midp/ttips/screenlock/
    • (2004) Sun Technical Articles and Tips
    • Mahmoud, Q.H.1
  • 15
    • 84948737028 scopus 로고    scopus 로고
    • A simple view of type-secure information flow in the pi-calculus
    • IEEE Computer Society Press, Los Alamitos
    • Pottier, F.: A simple view of type-secure information flow in the pi-calculus. In: Proc. IEEE Computer Security Foundations Workshop, pp. 320-330. IEEE Computer Society Press, Los Alamitos (2002)
    • (2002) Proc. IEEE Computer Security Foundations Workshop , pp. 320-330
    • Pottier, F.1
  • 16
    • 33947645959 scopus 로고    scopus 로고
    • Securing interaction between threads and the scheduler
    • IEEE Computer Society Press, Los Alamitos
    • Russo, A., Sabelfeld, A.: Securing interaction between threads and the scheduler. In: Proc. IEEE Computer Security Foundations Workshop, pp. 177-189. IEEE Computer Society Press, Los Alamitos (2006)
    • (2006) Proc. IEEE Computer Security Foundations Workshop , pp. 177-189
    • Russo, A.1    Sabelfeld, A.2
  • 17
    • 38049174641 scopus 로고    scopus 로고
    • Russo, A., Sabelfeld, A.: Security for multithreaded programs under cooperative scheduling. In: Virbitskaite, I., Voronkov, A. (eds.) PSI 2006. LNCS, 4378, Springer, Heidelberg (2007)
    • Russo, A., Sabelfeld, A.: Security for multithreaded programs under cooperative scheduling. In: Virbitskaite, I., Voronkov, A. (eds.) PSI 2006. LNCS, vol. 4378, Springer, Heidelberg (2007)
  • 18
    • 49949107220 scopus 로고    scopus 로고
    • Mathematical models of computer security-tutorial lectures
    • Focardi, R, Gorrieri. R, eds, FOSAD 2001, Springer. Heidelberg
    • Ryan, P.: Mathematical models of computer security-tutorial lectures. In: Focardi, R., Gorrieri. R. (eds.) FOSAD 2001. LNCS, vol. 2946, Springer. Heidelberg (2004)
    • (2004) LNCS , vol.2946
    • Ryan, P.1
  • 19
    • 49949120080 scopus 로고    scopus 로고
    • Sabelfeld, A.: The impact of synchronisation on secure information flow in concurrent programs. In: Bjømer, D., Broy, M., Zamulin, A.V. (eds.) PSI 2001. LNCS, 2244, Springer, Heidelberg (2001)
    • Sabelfeld, A.: The impact of synchronisation on secure information flow in concurrent programs. In: Bjømer, D., Broy, M., Zamulin, A.V. (eds.) PSI 2001. LNCS, vol. 2244, Springer, Heidelberg (2001)
  • 20
    • 84958755151 scopus 로고    scopus 로고
    • Sabelfeld, A., Mantel, H.: Static confidentiality enforcement for distributed programs. In: Hermenegildo. M.V., Puebla, G. (eds.) SAS 2002. LNCS, 2477. Springer, Heidelberg (2002)
    • Sabelfeld, A., Mantel, H.: Static confidentiality enforcement for distributed programs. In: Hermenegildo. M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477. Springer, Heidelberg (2002)
  • 22
    • 0033700286 scopus 로고    scopus 로고
    • Probabilistic noninterference for multi-threaded programs
    • IEEE Computer Society Press, Los Alamitos
    • Sabelfeld, A., Sands, D.: Probabilistic noninterference for multi-threaded programs. In: Proc. IEEE Computer Security Foundations Workshop, pp. 200-214. IEEE Computer Society Press, Los Alamitos (2000)
    • (2000) Proc. IEEE Computer Security Foundations Workshop , pp. 200-214
    • Sabelfeld, A.1    Sands, D.2
  • 23
    • 0034835461 scopus 로고    scopus 로고
    • A new type system for secure information flow
    • IEEE Computer Society Press, Los Alamitos
    • Smith, G.: A new type system for secure information flow. In: Proc. IEEE Computer Security Foundations Workshop, pp. 115-125. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) Proc. IEEE Computer Security Foundations Workshop , pp. 115-125
    • Smith, G.1
  • 24
    • 18544362925 scopus 로고    scopus 로고
    • Probabilistic noninterference through weak probabilistic bisimulation
    • IEEE Computer Society Press, Los Alamitos
    • Smith, G.: Probabilistic noninterference through weak probabilistic bisimulation. In: Proc. IEEE Computer Security Foundations Workshop, pp. 3-13. IEEE Computer Society Press, Los Alamitos (2003)
    • (2003) Proc. IEEE Computer Security Foundations Workshop , pp. 3-13
    • Smith, G.1
  • 25
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • ACM Press, New York
    • Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: Proc. ACM Symp. on Principles of Programming Languages, pp. 355-364. ACM Press, New York (1998)
    • (1998) Proc. ACM Symp. on Principles of Programming Languages , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 26
    • 33745938077 scopus 로고    scopus 로고
    • Smith, S.F., Thober, M.: Refactoring programs to secure information flows. In: PLAS 2006, pp. 75-84. ACM Press, New York (2006)
    • Smith, S.F., Thober, M.: Refactoring programs to secure information flows. In: PLAS 2006, pp. 75-84. ACM Press, New York (2006)
  • 27
    • 0033330060 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language
    • Volpano, D., Smith, G.: Probabilistic noninterference in a concurrent language. J. Computer Security 7(2-3), 231-253 (1999)
    • (1999) J. Computer Security , vol.7 , Issue.2-3 , pp. 231-253
    • Volpano, D.1    Smith, G.2
  • 28
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. J. Computer Security 4(3), 167-187 (1996)
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 30
    • 84942242915 scopus 로고    scopus 로고
    • Observational determinism, for concurrent program, security
    • IEEE Computer Society Press, Los Alamitos
    • Zdancewic, S., Myers, A.C.: Observational determinism, for concurrent program, security. In: Proc. IEEE Computer Security Foundations Workshop, pp. 29-43. IEEE Computer Society Press, Los Alamitos (2003)
    • (2003) Proc. IEEE Computer Security Foundations Workshop , pp. 29-43
    • Zdancewic, S.1    Myers, A.C.2
  • 31
    • 0038825029 scopus 로고    scopus 로고
    • Using replication and partitioning to build, secure distributed systems
    • IEEE Computer Society Press, Los Alamitos
    • Zheng, L., Chong, S., Myers, A.C., Zdancewic, S.: Using replication and partitioning to build, secure distributed systems. In: Proc. IEEE Symp. on Security and Privacy, pp. 236-250. IEEE Computer Society Press, Los Alamitos (2003)
    • (2003) Proc. IEEE Symp. on Security and Privacy , pp. 236-250
    • Zheng, L.1    Chong, S.2    Myers, A.C.3    Zdancewic, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.