메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 236-250

Using replication and partitioning to build secure distributed systems

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); PROGRAM COMPILERS; SPECIFICATIONS;

EID: 59449105095     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2003.1199340     Document Type: Conference Paper
Times cited : (19)

References (61)
  • 2
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • Adam Back, Ulf Möller, and Anton Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. Lecture Notes in Computer Science, 2137, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2137
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 4
    • 0003400255 scopus 로고
    • Technical Report USAF Electronic Systems Division, Bedford, MA, April (Also available through National Technical Information Service, Springfield Va., NTIS AD-A039324.)
    • K. J. Biba. Integrity considerations for secure computer systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, April 1977. (Also available through National Technical Information Service, Springfield Va., NTIS AD-A039324.).
    • (1977) Integrity Considerations for Secure Computer Systems
    • Biba, K.J.1
  • 6
    • 84879520825 scopus 로고    scopus 로고
    • Noninterference for concurrent programs
    • Proc. ICALP, July
    • Gerard Boudol and Ilaria Castellani. Noninterference for concurrent programs. In Proc. ICALP, volume 2076 of Lecture Notes in Computer Science, pages 382-395, July 2001.
    • (2001) Lecture Notes in Computer Science , vol.2076 , pp. 382-395
    • Boudol, G.1    Castellani, I.2
  • 9
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • Dorothy E. Denning and Peter J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 12
    • 0038650568 scopus 로고
    • Designing secure and reliable applications using fragmentation-redundancy-scattering: An object-oriented approach
    • Newcastle-upon-Tyne, Dept of Computing Science, University of Newcastle, NE1 7RU, UK
    • Jean-Charles Fabre, Yves Deswarte, and Brian Randell. Designing secure and reliable applications using fragmentation-redundancy-scattering: an object-oriented approach. In PDCS 2: Open Conference, pages 343-362, Newcastle-upon-Tyne, 1994. Dept of Computing Science, University of Newcastle, NE1 7RU, UK.
    • (1994) PDCS 2: Open Conference , pp. 343-362
    • Fabre, J.-C.1    Deswarte, Y.2    Randell, B.3
  • 14
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • May
    • J. S. Fenton. Memoryless subsystems. Computing J., 17(2):143-147, May 1974.
    • (1974) Computing J. , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 17
    • 0003608910 scopus 로고    scopus 로고
    • Typing correspondence assertions for communication protocols
    • Preliminary Proceedings of the 17th Conference on the Mathematical Foundations of Programming Semantics (MFPS 17), Aarhus, May 2001. May
    • Andrew D. Gordon and Alan Jeffrey. Typing correspondence assertions for communication protocols. In Preliminary Proceedings of the 17th Conference on the Mathematical Foundations of Programming Semantics (MFPS 17), Aarhus, May 2001. BRICS Notes Series NS-01-2, May 2001, pages 99-120.
    • (2001) BRICS Notes Series NS-01-2 , pp. 99-120
    • Gordon, A.D.1    Jeffrey, A.2
  • 24
    • 0034823079 scopus 로고    scopus 로고
    • A generic approach to the security of multi-threaded programs
    • IEEE Computer Society Press, June
    • Heiko Mantel and Andrei Sabelfeld. A generic approach to the security of multi-threaded programs. In Proc. 14th IEEE Computer Security Foundations Workshop, pages 126-142. IEEE Computer Society Press, June 2001.
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop , pp. 126-142
    • Mantel, H.1    Sabelfeld, A.2
  • 25
    • 0026910016 scopus 로고
    • Multilevel security in the UNIX tradition
    • August
    • M. Douglas McIlroy and James A. Reeds. Multilevel security in the UNIX tradition. Software - Practice and Experience, 22(8):673-694, August 1992.
    • (1992) Software - Practice and Experience , vol.22 , Issue.8 , pp. 673-694
    • McIlroy, M.D.1    Reeds, J.A.2
  • 27
    • 0016951438 scopus 로고
    • Security kernel validation in practice
    • May
    • Jonathan K. Millen. Security kernel validation in practice. Comm. of the ACM, 19(5):243-250, May 1976.
    • (1976) Comm. of the ACM , vol.19 , Issue.5 , pp. 243-250
    • Millen, J.K.1
  • 28
    • 84937543808 scopus 로고
    • Information flow analysis of formal specifications
    • April
    • Jonathan K. Millen. Information flow analysis of formal specifications. In Proc. IEEE Symposium on Security and Privacy, pages 3-8, April 1981.
    • (1981) Proc. IEEE Symposium on Security and Privacy , pp. 3-8
    • Millen, J.K.1
  • 32
    • 84955596529 scopus 로고
    • Trust in the λ-calculus
    • Proc. 2nd International Symposium on Static Analysis, Springer, September
    • Jens Palsberg and Peter Ørbæk. Trust in the λ-calculus. In Proc. 2nd International Symposium on Static Analysis, number 983 in Lecture Notes in Computer Science, pages 314-329. Springer, September 1995.
    • (1995) Lecture Notes in Computer Science , Issue.983 , pp. 314-329
    • Palsberg, J.1    Ørbæk, P.2
  • 33
    • 84948737028 scopus 로고    scopus 로고
    • A simple view of type-secure information flow in the pi-calculus
    • June
    • François Pottier. A simple view of type-secure information flow in the pi-calculus. In Proc. IEEE Computer Security Foundations Workshop, pages 320-330, June 2002.
    • (2002) Proc. IEEE Computer Security Foundations Workshop , pp. 320-330
    • Pottier, F.1
  • 37
    • 84958755151 scopus 로고    scopus 로고
    • Static confidentiality enforcement for distributed programs
    • Proceedings of the 9th International Static Analysis Symposium, Madrid, Spain, September Springer-Verlag
    • Andrei Sabelfeld and Heiko Mantel. Static confidentiality enforcement for distributed programs. In Proceedings of the 9th International Static Analysis Symposium, volume 2477 of LNCS, Madrid, Spain, September 2002. Springer-Verlag.
    • (2002) LNCS , vol.2477
    • Sabelfeld, A.1    Mantel, H.2
  • 39
    • 0033700286 scopus 로고    scopus 로고
    • Probabilistic noninterference for multi-threaded programs
    • IEEE Computer Society Press, July
    • Andrei Sabelfeld and David Sands. Probabilistic noninterference for multi-threaded programs. In Proc. 13th IEEE Computer Security Foundations Workshop, pages 200-214. IEEE Computer Society Press, July 2000.
    • (2000) Proc. 13th IEEE Computer Security Foundations Workshop , pp. 200-214
    • Sabelfeld, A.1    Sands, D.2
  • 40
    • 0025564050 scopus 로고
    • Implementing fault-tolerant services using the state machine approach: A tutorial
    • December
    • Fred B. Schneider. Implementing fault-tolerant services using the state machine approach: a tutorial. ACM Computing Surveys, 22(4):299-319, December 1990.
    • (1990) ACM Computing Surveys , vol.22 , Issue.4 , pp. 299-319
    • Schneider, F.B.1
  • 41
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • Also available as TR 99-1759, Computer Science Department, Cornell University, Ithaca, New York
    • Fred B. Schneider. Enforceable security policies. ACM Transactions on Information and System Security, 3(1):30-50, 2001. Also available as TR 99-1759, Computer Science Department, Cornell University, Ithaca, New York.
    • (2001) ACM Transactions on Information and System Security , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 42
  • 44
    • 0034835461 scopus 로고    scopus 로고
    • A new type system for secure information flow
    • IEEE Computer Society Press, June
    • Geoffrey Smith. A new type system for secure information flow. In CSFW14, pages 115-125. IEEE Computer Society Press, June 2001.
    • (2001) CSFW14 , pp. 115-125
    • Smith, G.1
  • 45
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • San Diego, California, January
    • Geoffrey Smith and Dennis Volpano. Secure information flow in a multi-threaded imperative language. In Proc. 25th ACM Symp. on Principles of Programming Languages (POPL), pages 355-364, San Diego, California, January 1998.
    • (1998) Proc. 25th ACM Symp. on Principles of Programming Languages (POPL) , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 48
    • 0003468988 scopus 로고
    • version 1.0 beta edition, October
    • Sun Microsystems. Java Language Specification, version 1.0 beta edition, October 1995. Available at ftp://ftp.javasoft.com/docs/javaspec.ps.zip.
    • (1995) Java Language Specification
    • Sun Microsystems1
  • 50
    • 0000990322 scopus 로고
    • A survey of program slicing techniques
    • Frank Tip. A survey of program slicing techniques. Journal of Programming Languages, 3:121-189, 1995.
    • (1995) Journal of Programming Languages , vol.3 , pp. 121-189
    • Tip, F.1
  • 51
    • 0037974226 scopus 로고
    • Improvement of data processing security by means of fault tolerance
    • Washington, USA
    • Gilles Trouessin, Jean-Charles Fabre, and Yves Deswarte. Improvement of data processing security by means of fault tolerance. In 14th National Computer Security Conference, pages 295-304, Washington, USA, 1991.
    • (1991) 14th National Computer Security Conference , pp. 295-304
    • Trouessin, G.1    Fabre, J.-C.2    Deswarte, Y.3
  • 52
    • 0033330060 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language
    • November
    • Dennis Volpano and Geoffrey Smith. Probabilistic noninterference in a concurrent language. J. Computer Security, 7(23):231-253, November 1999.
    • (1999) J. Computer Security , vol.7 , Issue.2-3 , pp. 231-253
    • Volpano, D.1    Smith, G.2
  • 53
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Dennis Volpano, Geoffrey Smith, and Cynthia Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 55
    • 0039334688 scopus 로고    scopus 로고
    • The security architecture formerly known as stack inspection: A security mechanism for language-based systems
    • October
    • Dan S. Wallach, Andrew W. Appel, and Edward W. Felten. The security architecture formerly known as stack inspection: A security mechanism for language-based systems. ACM Transactions on Software Engineering and Methodology, 9(4), October 2000.
    • (2000) ACM Transactions on Software Engineering and Methodology , vol.9 , Issue.4
    • Wallach, D.S.1    Appel, A.W.2    Felten, E.W.3
  • 58
    • 85084164692 scopus 로고    scopus 로고
    • SSH - Secure login connections over the Internet
    • San Jose, California
    • Tatu Ylonen. SSH - secure login connections over the Internet. In The Sixth USENIX Security Symposium Proceedings, pages 37-42, San Jose, California, 1996.
    • (1996) The Sixth USENIX Security Symposium Proceedings , pp. 37-42
    • Ylonen, T.1
  • 60
    • 84945262623 scopus 로고    scopus 로고
    • Secure information flow and CPS
    • Proc. 10th European Symposium on Programming
    • Steve Zdancewic and Andrew C. Myers. Secure information flow and CPS. In Proc. 10th European Symposium on Programming, volume 2028 of Lecture Notes in Computer Science, pages 46-61, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2028 , pp. 46-61
    • Zdancewic, S.1    Myers, A.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.