메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1-9

Simulating midlet's security claims with automata Modulo theory

Author keywords

Automata; Mobile code; Security policy

Indexed keywords

AUTOMATA; DECIDABLE THEORIES; FAIR SIMULATIONS; MOBILE CODE; MOBILE CODES; MOBILE PLATFORMS; MODULO THEORIES; REALISTIC SCENARIOS; SECURITY POLICY;

EID: 57349119324     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1375696.1375698     Document Type: Conference Paper
Times cited : (4)

References (30)
  • 1
    • 33750110668 scopus 로고    scopus 로고
    • Toward pervasive computing
    • ISSN 1536-1268
    • J, Bacon. Toward pervasive computing. IEEE Pervasive Camp. Magazine, 1(2):84, 2002. ISSN 1536-1268.
    • (2002) IEEE Pervasive Camp. Magazine , vol.1 , Issue.2 , pp. 84
    • Bacon, J.1
  • 4
    • 49049117172 scopus 로고    scopus 로고
    • N. Bielova, M. Dalla Torre, N. Dragoni, and 1. Siahaan. Matching policies with security claims of mobile applications. In Proc. of the 3rd Int. Conf. on Availability, Reliability and Security (ARES'08). IEEE Press, 2008.
    • N. Bielova, M. Dalla Torre, N. Dragoni, and 1. Siahaan. Matching policies with security claims of mobile applications. In Proc. of the 3rd Int. Conf. on Availability, Reliability and Security (ARES'08). IEEE Press, 2008.
  • 5
    • 26444487547 scopus 로고    scopus 로고
    • Efficient satisfiability modulo theories via delayed theory combination
    • K. Etessami and S.K. Rajamani, editors, Proc. cf CAV'05, of, Springer-Verlag
    • M. Bozzano, R. Bruttornesso, A. Cirnatti, T. Junttila, S. Ranise, Rv. Rossum, and R. Sebastiani. Efficient satisfiability modulo theories via delayed theory combination. In K. Etessami and S.K. Rajamani, editors, Proc. cf CAV'05, volume 3576 of LNCS, pages 335-349. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3576 , pp. 335-349
    • Bozzano, M.1    Bruttornesso, R.2    Cirnatti, A.3    Junttila, T.4    Ranise, S.5    Rossum, R.6    Sebastiani, R.7
  • 6
    • 0002921593 scopus 로고
    • On a decision method in restricted second-order arithmetic
    • E. Nagel et al, editor, Stanford University Press
    • J.R. Büchi, On a decision method in restricted second-order arithmetic. In E. Nagel et al., editor, Int. Cong, on Logic, Methodology and Philosophy of Science, pages 1-11. Stanford University Press, 1962.
    • (1962) Int. Cong, on Logic, Methodology and Philosophy of Science , pp. 1-11
    • Büchi, J.R.1
  • 7
    • 49049106661 scopus 로고    scopus 로고
    • Security-by- Contract: Toward a Semantics for Digital Signatures on Mobile Code
    • Springer-Verlag
    • N. Dragoni, F. Massacci, K. Naliuka, and I. Siahaan. Security-by- Contract: Toward a Semantics for Digital Signatures on Mobile Code. In Proc. of EuroPKI'07. Springer-Verlag, 2007a.
    • (2007) Proc. of EuroPKI'07
    • Dragoni, N.1    Massacci, F.2    Naliuka, K.3    Siahaan, I.4
  • 9
    • 24944483574 scopus 로고    scopus 로고
    • The Inlined Reference Monitor Approach to Security Policy Enforcement
    • Technical report 2003-1916, Department of Computer Science, Cornell University
    • U. Erlingsson. The Inlined Reference Monitor Approach to Security Policy Enforcement. Technical report 2003-1916, Department of Computer Science, Cornell University, 2003.
    • (2003)
    • Erlingsson, U.1
  • 10
    • 0033724116 scopus 로고    scopus 로고
    • U. Erlingsson and F.B. Schneider, lrm enforcement of Java stack inspection. In Proc. of Symp. on Sec. and Privacy, page 246. IEEE Press, 2000. ISBN 0-7695-0665-8.
    • U. Erlingsson and F.B. Schneider, lrm enforcement of Java stack inspection. In Proc. of Symp. on Sec. and Privacy, page 246. IEEE Press, 2000. ISBN 0-7695-0665-8.
  • 11
    • 27144454045 scopus 로고    scopus 로고
    • K. Etessami, T. Wilke, and R. Schuller. Fair simulation relations, parity games, and state space reduction for büchi automata. SIAM J. on Comp., 34(5):1159-1175, 2005. ISSN 0097-5397.
    • K. Etessami, T. Wilke, and R. Schuller. Fair simulation relations, parity games, and state space reduction for büchi automata. SIAM J. on Comp., 34(5):1159-1175, 2005. ISSN 0097-5397.
  • 12
    • 84937561488 scopus 로고    scopus 로고
    • Fair simulation minimization
    • Springer-Verlag, ISBN 3-540-43997-8
    • S. Gurumurthy, R. Bloem, and F. Somenzi. Fair simulation minimization. In Proc. of CAV'02, pages 610-624. Springer-Verlag, 2002. ISBN 3-540-43997-8.
    • (2002) Proc. of CAV'02 , pp. 610-624
    • Gurumurthy, S.1    Bloem, R.2    Somenzi, F.3
  • 16
    • 11444249649 scopus 로고    scopus 로고
    • A classification of symbolic transition systems
    • 6 1, ISSN 1529-3785
    • T.A. Henzinger, R. Majumdar, and J.F. Raskin. A classification of symbolic transition systems. ACM Trans. Comput. Logic, 6( 1): 1-32, 2005. ISSN 1529-3785.
    • (2005) ACM Trans. Comput. Logic , pp. 1-32
    • Henzinger, T.A.1    Majumdar, R.2    Raskin, J.F.3
  • 22
    • 33847102258 scopus 로고    scopus 로고
    • Solving SAT and SAT Modulo Theories: From an Abstract Davis-Putnam-Logemann-Loveland Procedure to DPLL(T)
    • R. Nieuwenhuis, A. Oliveras, and C. Tinelli. Solving SAT and SAT Modulo Theories: from an Abstract Davis-Putnam-Logemann-Loveland Procedure to DPLL(T). J. of the ACM, 53(6):937-977, 2006.
    • (2006) J. of the ACM , vol.53 , Issue.6 , pp. 937-977
    • Nieuwenhuis, R.1    Oliveras, A.2    Tinelli, C.3
  • 24
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • FB. Schneider. Enforceable security policies. TISSEC, 3(l):30-50, 2000.
    • (2000) TISSEC , vol.3 , Issue.L , pp. 30-50
    • Schneider, F.B.1
  • 30
    • 84982946701 scopus 로고    scopus 로고
    • A sanctuary for mobile agents
    • J. Vitek and CD. Jensen, editors, Springer-Verlag
    • B.S. Yee. A sanctuary for mobile agents. In J. Vitek and CD. Jensen, editors, Secure Internet Programming, pages 261-273. Springer-Verlag, 1999.
    • (1999) Secure Internet Programming , pp. 261-273
    • Yee, B.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.