메뉴 건너뛰기




Volumn , Issue , 2008, Pages 17-32

Refinement types for secure implementations

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SECURITY; CRYPTOGRAPHIC PROTOCOLS; SOURCE CODING;

EID: 51749098783     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2008.27     Document Type: Conference Paper
Times cited : (84)

References (51)
  • 2
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Sept
    • M. Abadi. Secrecy by typing in security protocols. JACM, 46(5):749-786, Sept. 1999.
    • (1999) JACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 3
    • 23144463868 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • M. Abadi and B. Blanchet. Analyzing security protocols with secrecy types and logic programs. JACM, 52(1):102-146, 2005.
    • (2005) JACM , vol.52 , Issue.1 , pp. 102-146
    • Abadi, M.1    Blanchet, B.2
  • 5
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148:1-70, 1999.
    • (1999) Information and Computation , vol.148 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 6
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 7
    • 0027667638 scopus 로고
    • A calculus for access control in distributed systems
    • M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. ACMTOPLAS, 15(4):706-734, 1993.
    • (1993) ACMTOPLAS , vol.15 , Issue.4 , pp. 706-734
    • Abadi, M.1    Burrows, M.2    Lampson, B.3    Plotkin, G.4
  • 8
    • 33749846305 scopus 로고    scopus 로고
    • Cryptographicallymasked flows
    • Static Analysis Symposium, of, Springer
    • A. Askarov, D. Hedin, and A. Sabelfeld. Cryptographicallymasked flows. In Static Analysis Symposium, volume 4134 of LNCS, pages 353-369. Springer, 2006.
    • (2006) LNCS , vol.4134 , pp. 353-369
    • Askarov, A.1    Hedin, D.2    Sabelfeld, A.3
  • 9
    • 0035817896 scopus 로고    scopus 로고
    • Subtyping dependent types
    • D. Aspinall and A. Compagnoni. Subtyping dependent types. TCS, 266(1-2):273-309, 2001.
    • (2001) TCS , vol.266 , Issue.1-2 , pp. 273-309
    • Aspinall, D.1    Compagnoni, A.2
  • 10
    • 19044390891 scopus 로고    scopus 로고
    • The Spec# programming system: An overview, Springer, January
    • M. Barnett, M. Leino, and W. Schulte. The Spec# programming system: An overview. In CASSIS'05, volume 3362 of LNCS, pages 49-69. Springer, January 2005.
    • (2005) CASSIS'05, volume 3362 of LNCS , pp. 49-69
    • Barnett, M.1    Leino, M.2    Schulte, W.3
  • 11
    • 51749099522 scopus 로고    scopus 로고
    • K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. Technical Report MSR-TR-2006-46, Microsoft Research, 2007. See also CSFW'06 and WS-FM'06.
    • K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. Technical Report MSR-TR-2006-46, Microsoft Research, 2007. See also CSFW'06 and WS-FM'06.
  • 14
    • 84974613879 scopus 로고
    • Typechecking dependent types and subtypes
    • Foundations of Logic and Functional Programming, of, Springer
    • L. Cardelli. Typechecking dependent types and subtypes. In Foundations of Logic and Functional Programming, volume 306 of LNCS, pages 45-57. Springer, 1986.
    • (1986) LNCS , vol.306 , pp. 45-57
    • Cardelli, L.1
  • 16
    • 24144474987 scopus 로고    scopus 로고
    • ESC/Java2: Uniting ESC/Java and JML
    • CASSIS'05, of, Springer
    • D. R. Cok and J. Kiniry. ESC/Java2: Uniting ESC/Java and JML. In CASSIS'05, volume 3362 of LNCS, pages 108-128. Springer, 2004.
    • (2004) LNCS , vol.3362 , pp. 108-128
    • Cok, D.R.1    Kiniry, J.2
  • 17
    • 45749085681 scopus 로고    scopus 로고
    • Z3: An efficient SMT solver
    • Tools and Algorithms for the Construction and Analysis of Systems TACAC'08, of, Springer
    • L. de Moura and N. Bjørner. Z3: An efficient SMT solver. In Tools and Algorithms for the Construction and Analysis of Systems (TACAC'08), volume 4963 of LNCS, pages 337-340. Springer, 2008.
    • (2008) LNCS , vol.4963 , pp. 337-340
    • de Moura, L.1    Bjørner, N.2
  • 18
    • 24944448541 scopus 로고    scopus 로고
    • Simplify: A theorem prover for program checking
    • D. Detlefs, G. Nelson, and J. Saxe. Simplify: A theorem prover for program checking. JACM, 52(3):365-473, 2005.
    • (2005) JACM , vol.52 , Issue.3 , pp. 365-473
    • Detlefs, D.1    Nelson, G.2    Saxe, J.3
  • 19
  • 24
    • 34548463070 scopus 로고    scopus 로고
    • C. Fournet, A. D. Gordon, and S. Maffeis. A type discipline for authorization policies. ACM TOPLAS, 29(5), 2007a. In press.
    • C. Fournet, A. D. Gordon, and S. Maffeis. A type discipline for authorization policies. ACM TOPLAS, 29(5), 2007a. In press.
  • 27
    • 51749115896 scopus 로고    scopus 로고
    • A. D. Gordon and A. S. A. Jeffrey. Cryptyc: Cryptographic protocol type checker. At http://cryptyc.cs.depaul.edu/, 2002.
    • A. D. Gordon and A. S. A. Jeffrey. Cryptyc: Cryptographic protocol type checker. At http://cryptyc.cs.depaul.edu/, 2002.
  • 28
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • A. D. Gordon and A. S. A. Jeffrey. Authenticity by typing for security protocols. Journal of Computer Security, 11(4):451-521, 2003a.
    • (2003) Journal of Computer Security , vol.11 , Issue.4 , pp. 451-521
    • Gordon, A.D.1    Jeffrey, A.S.A.2
  • 29
    • 3042660681 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • A. D. Gordon and A. S. A. Jeffrey. Types and effects for asymmetric cryptographic protocols. Journal of Computer Security, 12(3/4):435-484, 2003b.
    • (2003) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 435-484
    • Gordon, A.D.1    Jeffrey, A.S.A.2
  • 30
    • 24144470036 scopus 로고    scopus 로고
    • Cryptographic protocol analysis on real C code
    • J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real C code. In VMCAI'05, pages 363-379, 2005.
    • (2005) VMCAI'05 , pp. 363-379
    • Goubault-Larrecq, J.1    Parrennes, F.2
  • 33
    • 24144433896 scopus 로고    scopus 로고
    • Implementing a formally verifiable security protocol in Java Card
    • E. Hubbers, M. Oostdijk, and E. Poll. Implementing a formally verifiable security protocol in Java Card. In Security in Pervasive Computing, pages 213-226, 2003.
    • (2003) Security in Pervasive Computing , pp. 213-226
    • Hubbers, E.1    Oostdijk, M.2    Poll, E.3
  • 34
    • 0015561577 scopus 로고
    • Protection in programming languages
    • J. H. Morris, Jr. Protection in programming languages. Commun. ACM, 16(1):15-21, 1973.
    • (1973) Commun. ACM , vol.16 , Issue.1 , pp. 15-21
    • Morris Jr., J.H.1
  • 37
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 39
    • 51749109735 scopus 로고    scopus 로고
    • Verifying an implementation of SSH
    • E. Poll and A. Schubert. Verifying an implementation of SSH. In WITS'07, pages 164-177, 2007.
    • (2007) WITS'07 , pp. 164-177
    • Poll, E.1    Schubert, A.2
  • 41
    • 0348017041 scopus 로고    scopus 로고
    • Information flow inference for ML
    • F. Pottier and V. Simonet. Information flow inference for ML. ACM TOPLAS, 25(1):117-158, 2003.
    • (2003) ACM TOPLAS , vol.25 , Issue.1 , pp. 117-158
    • Pottier, F.1    Simonet, V.2
  • 42
    • 84945270736 scopus 로고    scopus 로고
    • A systematic approach to access control
    • Programming Languages and Systems ESOP 2001, of, Springer
    • F. Pottier, C. Skalka, and S. Smith. A systematic approach to access control. In Programming Languages and Systems (ESOP 2001), volume 2028 of LNCS, pages 30-45. Springer, 2001.
    • (2001) LNCS , vol.2028 , pp. 30-45
    • Pottier, F.1    Skalka, C.2    Smith, S.3
  • 45
    • 0000307929 scopus 로고
    • Reasoning about programs in continuation-passing style
    • A. Sabry and M. Felleisen. Reasoning about programs in continuation-passing style. LISP and Symbolic Computation, 6(3-4):289-360, 1993.
    • (1993) LISP and Symbolic Computation , vol.6 , Issue.3-4 , pp. 289-360
    • Sabry, A.1    Felleisen, M.2
  • 46
    • 34047126463 scopus 로고    scopus 로고
    • A bisimulation for dynamic sealing
    • Extended abstract at POPL'04
    • E. Sumii and B. Pierce. A bisimulation for dynamic sealing. TCS, 375(1-3):169-192, 2007. Extended abstract at POPL'04.
    • (2007) TCS , vol.375 , Issue.1-3 , pp. 169-192
    • Sumii, E.1    Pierce, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.