메뉴 건너뛰기




Volumn 12, Issue 1, 2008, Pages

Secrecy in multiagent systems

Author keywords

Information flow; Secrecy

Indexed keywords

COMPUTER SCIENCE; SAFETY ENGINEERING;

EID: 56349155009     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1410234.1410239     Document Type: Article
Times cited : (80)

References (44)
  • 3
    • 56349087322 scopus 로고    scopus 로고
    • CLARK, D., HUNT, S., AND MALACARIA, P. 2002. Quantitative analysis of the leakage of confidential data. Electronic Notes in Theoretical Computer Science 59, 3. In Proceedings of the Workshop on Quantitative Aspects of Programming Languages (QAPL'01).
    • CLARK, D., HUNT, S., AND MALACARIA, P. 2002. Quantitative analysis of the leakage of confidential data. Electronic Notes in Theoretical Computer Science 59, 3. In Proceedings of the Workshop on Quantitative Aspects of Programming Languages (QAPL'01).
  • 6
    • 0003297274 scopus 로고
    • Alternative semantics for temporal logics
    • EMERSON, E. A. 1983. Alternative semantics for temporal logics. Theor. Comput. Sci., 26, 121-130.
    • (1983) Theor. Comput. Sci , vol.26 , pp. 121-130
    • EMERSON, E.A.1
  • 9
    • 0025465251 scopus 로고
    • A logic for reasoning about probabilities
    • FAGIN, R., HALPERN, J. Y., AND MEGIDDO, N. 1990. A logic for reasoning about probabilities. Inf. Comput., 87, 1/2, 78-128.
    • (1990) Inf. Comput , vol.87 , Issue.1-2 , pp. 78-128
    • FAGIN, R.1    HALPERN, J.Y.2    MEGIDDO, N.3
  • 11
    • 84974776068 scopus 로고
    • A classification of security properties for process algebra
    • FOCARDI, R. AND GORRIERI, R. 1994. A classification of security properties for process algebra. J. Comput. Sci., 3, 1, 5-33.
    • (1994) J. Comput. Sci , vol.3 , Issue.1 , pp. 5-33
    • FOCARDI, R.1    GORRIERI, R.2
  • 12
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (Part I: Information flow)
    • Springer
    • FOCARDI, R. AND GORRIERI, R. 2001. Classification of security properties (Part I: Information flow). In Foundations of Security Analysis and Design. Springer, 331-396.
    • (2001) Foundations of Security Analysis and Design , pp. 331-396
    • FOCARDI, R.1    GORRIERI, R.2
  • 15
    • 0032047481 scopus 로고    scopus 로고
    • A logical approach to multilevel security of probabilistic systems
    • GRAY, J. W. AND SYVERSON, P. F. 1998. A logical approach to multilevel security of probabilistic systems. Dist. Comput, 11, 2, 73-90.
    • (1998) Dist. Comput , vol.11 , Issue.2 , pp. 73-90
    • GRAY, J.W.1    SYVERSON, P.F.2
  • 17
    • 0036815905 scopus 로고    scopus 로고
    • Characterizing the common prior assumption
    • HALPERN, J. Y. 2002. Characterizing the common prior assumption. J. Econ. Theory, 106, 2, 316-355.
    • (2002) J. Econ. Theory , vol.106 , Issue.2 , pp. 316-355
    • HALPERN, J.Y.1
  • 21
    • 35248868917 scopus 로고    scopus 로고
    • Modeling adversaries in a logic for security protocol analysis
    • Proceedings of the Formal Aspects of Security FASec'02, Springer-Verlag, Berlin/Heidelberg/New York
    • HALPERN, J. Y. AND PUCELLA, R. 2003a. Modeling adversaries in a logic for security protocol analysis. In Proceedings of the Formal Aspects of Security (FASec'02). Lecture Notes in Computer Science, Volume 2629. Springer-Verlag, Berlin/Heidelberg/New York, 115-132.
    • (2003) Lecture Notes in Computer Science , vol.2629 , pp. 115-132
    • HALPERN, J.Y.1    PUCELLA, R.2
  • 23
    • 0027665952 scopus 로고
    • Knowledge, probability, and adversaries
    • HALPERN, J. Y. AND TUTTLE, M. R. 1993. Knowledge, probability, and adversaries. J. ACM, 40, 4, 917-962.
    • (1993) J. ACM , vol.40 , Issue.4 , pp. 917-962
    • HALPERN, J.Y.1    TUTTLE, M.R.2
  • 24
    • 0043271203 scopus 로고
    • Recent work in inductive logic
    • T. Machan and K. Lucey, Eds. Rowman & Allanheld, Totowa, NJ
    • KYBURG, H. 1983. Recent work in inductive logic. In Recent Work in Philosophy, T. Machan and K. Lucey, Eds. Rowman & Allanheld, Totowa, NJ. 87-150.
    • (1983) Recent Work in Philosophy , pp. 87-150
    • KYBURG, H.1
  • 29
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • MCLEAN, J. 1994. A general theory of composition for trace sets closed under selective interleaving functions. In Proceedings of the IEEE Symposium on Security and Privacy (SP'94). 79-93.
    • (1994) Proceedings of the IEEE Symposium on Security and Privacy (SP'94) , pp. 79-93
    • MCLEAN, J.1
  • 30
    • 0346338341 scopus 로고    scopus 로고
    • MEYDEN, R. VAN DER 1998. Common knowledge and update in finite environments. Inf. Comput., 140, 2, 115-157.
    • MEYDEN, R. VAN DER 1998. Common knowledge and update in finite environments. Inf. Comput., 140, 2, 115-157.
  • 31
    • 33244491452 scopus 로고    scopus 로고
    • A probabilistic polynomial-time calculus for the analysis of cryptographic protocols
    • MITCHELL, J. C., RAMANATHAN, A., SCEDROV, A., AND TEAGUE, V. 2006. A probabilistic polynomial-time calculus for the analysis of cryptographic protocols. Theor. Comput. Sci. 353, 118-164.
    • (2006) Theor. Comput. Sci , vol.353 , pp. 118-164
    • MITCHELL, J.C.1    RAMANATHAN, A.2    SCEDROV, A.3    TEAGUE, V.4
  • 32
    • 84974067127 scopus 로고
    • The common prior assumption in economic theory
    • MORRIS, S. 1995. The common prior assumption in economic theory. Econom. Philos., 11, 227-253.
    • (1995) Econom. Philos , vol.11 , pp. 227-253
    • MORRIS, S.1
  • 35
    • 0020166136 scopus 로고
    • n-process mutual exclusion with bounded waiting by 4 · logr n-valued shared variable
    • RABIN, M. O. 1982. n-process mutual exclusion with bounded waiting by 4 · logr n-valued shared variable. J. Comp. Syst. Sci., 25, 1, 66-75.
    • (1982) J. Comp. Syst. Sci , vol.25 , Issue.1 , pp. 66-75
    • RABIN, M.O.1
  • 38
    • 0037251378 scopus 로고    scopus 로고
    • Language-based information-flow security
    • SABELFELD, A. AND MYERS, A. C. 2003. Language-based information-flow security. IEEE J. Select. Areas Comm., 21, 1, 5-19.
    • (2003) IEEE J. Select. Areas Comm , vol.21 , Issue.1 , pp. 5-19
    • SABELFELD, A.1    MYERS, A.C.2
  • 40
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • SHANNON, C. E. 1949. Communication theory of secrecy systems. Bell System Tech. J., 28-4, 656-715.
    • (1949) Bell System Tech. J , vol.28 -4 , pp. 656-715
    • SHANNON, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.