메뉴 건너뛰기




Volumn 7, Issue 6, 2008, Pages 421-435

Opacity generalised to transition systems

Author keywords

Abstract interpretation; Anonymity; Labelled transition systems; Non deducibility; Observable behaviour; Opacity; Petrinets

Indexed keywords

DATA STRUCTURES; GRAPH THEORY; MARINE BIOLOGY; OPACITY; PETRI NETS; VOTING MACHINES;

EID: 54549090072     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-008-0058-x     Document Type: Article
Times cited : (223)

References (34)
  • 4
    • 0025641513 scopus 로고
    • A Logic of Communication in a Hostile Environment
    • In: June 1990 IEEE Computer Society Press, New York
    • Bieber, P.: A Logic of Communication in a Hostile Environment. In: Computer Security Foundations Workshop, June 1990, vol. 3, pp. 14-22. IEEE Computer Society Press, New York (1990)
    • (1990) Computer Security Foundations Workshop , vol.3 , pp. 14-22
    • Bieber, P.1
  • 7
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • In: ACM Press, New York
    • Cousot, P., Cousot, R.: Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: 4th ACM Symposium on Principles of Programming Languages, pp. 238-252. ACM Press, New York (1977)
    • (1977) 4th ACM Symposium on Principles of Programming Languages , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 8
    • 0000963996 scopus 로고
    • Abstract interpretation frameworks
    • Cousot P., Cousot R.: Abstract interpretation frameworks. J. Log. Comput. 2(4), 511-547 (1992)
    • (1992) J. Log. Comput. , vol.2 , Issue.4 , pp. 511-547
    • Cousot, P.1    Cousot, R.2
  • 9
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev D., Yao A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198-208 (1983)
    • (1983) IEEE Trans. Inf. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 11
    • 54549092090 scopus 로고    scopus 로고
    • Andrea Maggiolo-Schettini, and Paolo Milazzo. Security in communicating hierarchical transaction-based timed automata
    • In: Warsaw University. ISBN 978-83-88374-28-9
    • Gruska, D.P.: Andrea Maggiolo-Schettini, and Paolo Milazzo. Security in communicating hierarchical transaction-based timed automata. In: Concurrency, Specification and Programming, CS&P'07, pp. 267-278, Warsaw University. ISBN 978-83-88374-28-9 (2007)
    • (2007) Concurrency, Specification and Programming, CS&P'07 , pp. 267-278
    • Gruska, D.P.1
  • 13
    • 0007441079 scopus 로고
    • The minimal coverability graph for Petri nets
    • Finkel A.: The minimal coverability graph for Petri nets. Lect. Notes Comput. Sci. 674, 210-243 (1993)
    • (1993) Lect. Notes Comput. Sci. , vol.674 , pp. 210-243
    • Finkel, A.1
  • 15
    • 84988393004 scopus 로고    scopus 로고
    • Classification of Security Properties: Information flow
    • In: LNCS
    • Focardi, R., Gorrieri, R.: Classification of Security Properties: Information flow. In: Foundations of Security Analysis and Design. LNCS, vol. 2171, pp. 331-396 (2000)
    • (2000) Foundations of Security Analysis and Design , vol.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 16
    • 35048861845 scopus 로고    scopus 로고
    • Efficient, verifiable shuffle decryption and its requirement of unlinkability
    • In: Bao, F., Deng, R.H., Zhou, J. (eds.) Springer, Heidelberg
    • Furukawa, J.: Efficient, verifiable shuffle decryption and its requirement of unlinkability. In: Bao, F., Deng, R.H., Zhou, J. (eds.) Public Key Cryptography. Lecture Notes in Computer Science, vol. 2947, pp. 319-332. Springer, Heidelberg (2004)
    • (2004) Public Key Cryptography. Lecture Notes in Computer Science , vol.2947 , pp. 319-332
    • Furukawa, J.1
  • 18
    • 34548643386 scopus 로고    scopus 로고
    • Observation based system security
    • Gruska D.P.: Observation based system security. Fundam. Inform. 79 (3-4), 335-346 (2007)
    • (2007) Fundam. Inform. , vol.79 , Issue.3-4 , pp. 335-346
    • Gruska, D.P.1
  • 21
  • 23
    • 0024928980 scopus 로고
    • A Logic of Knowledge and Belief for Reasoning about Security
    • In: June 1989 IEEE Computer Society Press, New York
    • Moser, L.: A Logic of Knowledge and Belief for Reasoning about Security. In: Computer Security Foundations Workshop, June 1989, vol. 2, pp. 57-63. IEEE Computer Society Press, New York (1989)
    • (1989) Computer Security Foundations Workshop , vol.2 , pp. 57-63
    • Moser, L.1
  • 25
    • 0006010789 scopus 로고
    • A Calculus of Information Flow
    • O'Halloran, C.: A Calculus of Information Flow. In: ESORICS, pp. 147-159 (1990)
    • (1990) ESORICS , pp. 147-159
    • O'Halloran, C.1
  • 26
    • 54549122421 scopus 로고    scopus 로고
    • Structural concepts for trust, contract and security management for a virtual chemical engineering organisation
    • Periorellis, P., Townson, C., English, P.: Structural concepts for trust, contract and security management for a virtual chemical engineering organisation. In: PST 2004, 2004. http://dev.hil.unb.ca/ Texts/PST/
    • (2004) PST 2004
    • Periorellis, P.1    Townson, C.2    English, P.3
  • 29
    • 0003912011 scopus 로고    scopus 로고
    • Reisig, W., Rozenberg, G. (eds.): LNCS 1491 & 1492
    • Reisig, W., Rozenberg, G. (eds.): Lectures on Petri nets. LNCS 1491 & 1492 (1998)
    • (1998) Lectures on Petri Nets


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.