메뉴 건너뛰기




Volumn 74, Issue 8, 2009, Pages 629-653

The Shadow Knows: Refinement and security in sequential programs

Author keywords

Hoare logic; Implementation; Logic of knowledge; Privacy; Security; Specification

Indexed keywords

HOARE LOGIC; IMPLEMENTATION; LOGIC OF KNOWLEDGE; PRIVACY; SECURITY;

EID: 67349149975     PISSN: 01676423     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.scico.2007.09.003     Document Type: Article
Times cited : (50)

References (31)
  • 1
    • 33746064873 scopus 로고    scopus 로고
    • The Shadow Knows: Refinement of ignorance in sequential programs
    • Proc. of 8th Int. Conf. on Mathematics of Program Construction. Uustalu T. (Ed). MPC 2006, Kuressaare, July 2006, Springer, Berlin
    • Morgan C. The Shadow Knows: Refinement of ignorance in sequential programs. In: Uustalu T. (Ed). Proc. of 8th Int. Conf. on Mathematics of Program Construction. MPC 2006, Kuressaare, July 2006. Lect. Notes in Comput. Sci. vol. 4014 (2006), Springer, Berlin 359-378
    • (2006) Lect. Notes in Comput. Sci. , vol.4014 , pp. 359-378
    • Morgan, C.1
  • 2
    • 84976773567 scopus 로고
    • Program development by stepwise refinement
    • Wirth N. Program development by stepwise refinement. Commun. ACM 14 4 (1971) 221-227
    • (1971) Commun. ACM , vol.14 , Issue.4 , pp. 221-227
    • Wirth, N.1
  • 3
    • 0038610515 scopus 로고
    • On the correctness of refinement steps in program development
    • Report A-1978-4, Dept. of Comput. Sci, Univ. of Helsinki
    • R.-J. Back, On the correctness of refinement steps in program development, Report A-1978-4, Dept. of Comput. Sci., Univ. of Helsinki, 1978
    • (1978)
    • Back, R.-J.1
  • 4
    • 84945708698 scopus 로고
    • An axiomatic basis for computer programming
    • 583
    • Hoare C.A.R. An axiomatic basis for computer programming. Commun. ACM 12 10 (1969) 576-580 583
    • (1969) Commun. ACM , vol.12 , Issue.10 , pp. 576-580
    • Hoare, C.A.R.1
  • 6
    • 0003648103 scopus 로고
    • Prentice Hall, New York URL: http://web.comlab.ox.ac.uk/oucl/publications/books/PfS/
    • Morgan C. Programming from Specifications. 2nd ed. Prentice Hall Int. Series in Comput. Sci. (1994), Prentice Hall, New York. http://web.comlab.ox.ac.uk/oucl/publications/books/PfS/ URL: http://web.comlab.ox.ac.uk/oucl/publications/books/PfS/
    • (1994) Prentice Hall Int. Series in Comput. Sci.
    • Morgan, C.1
  • 9
    • 0023834494 scopus 로고
    • Security specifications
    • S& P '88, Oakland, CA, 1988, IEEE CS Press, Los Alamitos, CA
    • Jacob J. Security specifications. Proc. of 1988 IEEE Symp. on Security and Privacy. S& P '88, Oakland, CA, 1988 (1988), IEEE CS Press, Los Alamitos, CA 14-23
    • (1988) Proc. of 1988 IEEE Symp. on Security and Privacy , pp. 14-23
    • Jacob, J.1
  • 11
    • 84948775046 scopus 로고    scopus 로고
    • Secrecy in multiagent systems
    • CSFW 2002 Cape Breton, NS, June 2002, IEEE CS Press, Los Alamitos, CA
    • Halpern J., and O'Neill K. Secrecy in multiagent systems. Proc. of 15th IEEE Computer Security Foundations Wksh. CSFW 2002 Cape Breton, NS, June 2002 (2002), IEEE CS Press, Los Alamitos, CA 32-46
    • (2002) Proc. of 15th IEEE Computer Security Foundations Wksh , pp. 32-46
    • Halpern, J.1    O'Neill, K.2
  • 12
    • 0003744223 scopus 로고
    • Cornell University Press, Ithaca, NY New edition prepared by V. F. Hendricks and J. Symons (King's College London Publications, London, 2005)
    • Hintikka J. Knowledge and Belief: An Introduction to the Logic of the Two Notions (1962), Cornell University Press, Ithaca, NY New edition prepared by V. F. Hendricks and J. Symons (King's College London Publications, London, 2005)
    • (1962) Knowledge and Belief: An Introduction to the Logic of the Two Notions
    • Hintikka, J.1
  • 13
    • 0025460546 scopus 로고
    • Knowledge and common knowledge in a distributed environment
    • Halpern J.Y., and Moses Y. Knowledge and common knowledge in a distributed environment. J. ACM 37 3 (1990) 549-587
    • (1990) J. ACM , vol.37 , Issue.3 , pp. 549-587
    • Halpern, J.Y.1    Moses, Y.2
  • 16
    • 67349180613 scopus 로고    scopus 로고
    • Unpublished notes, URL
    • C. Morgan, Unpublished notes "060320 atomicity", 2006, URL: http://www.cse.unsw.edu.au/~carrollm/Notes/
    • (2006) 060320 atomicity
    • Morgan, C.1
  • 17
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • Chaum D. The dining cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptol. 1 1 (1988) 65-75
    • (1988) J. Cryptol. , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 18
    • 0034836335 scopus 로고    scopus 로고
    • Preserving information flow properties under refinement
    • S& P 2001, Oakland, CA, May 2001, IEEE CS Press, Los Alamitos, CA
    • Mantel H. Preserving information flow properties under refinement. Proc. of 2001 IEEE Symp. Security and Privacy. S& P 2001, Oakland, CA, May 2001 (2001), IEEE CS Press, Los Alamitos, CA 78-91
    • (2001) Proc. of 2001 IEEE Symp. Security and Privacy , pp. 78-91
    • Mantel, H.1
  • 20
    • 33646018220 scopus 로고    scopus 로고
    • Anonymity and information hiding in multiagent systems
    • CSFW 2003, Pacific Grove, CA, June/July 2003, IEEE CS Press, Los Alamitos, CA
    • Halpern J., and O'Neill K. Anonymity and information hiding in multiagent systems. Proc. of 16th IEEE Computer Security Foundations Wksh. CSFW 2003, Pacific Grove, CA, June/July 2003 (2003), IEEE CS Press, Los Alamitos, CA 75-88
    • (2003) Proc. of 16th IEEE Computer Security Foundations Wksh , pp. 75-88
    • Halpern, J.1    O'Neill, K.2
  • 21
    • 0021177508 scopus 로고
    • Unwinding and inference control
    • S& P '84, Oakland, CA, Apr. 1984, IEEE CS Press, Washington, CA
    • Goguen J., and Meseguer J. Unwinding and inference control. Proc. of 1984 IEEE Symp. on Security and Privacy. S& P '84, Oakland, CA, Apr. 1984 (1984), IEEE CS Press, Washington, CA 75-86
    • (1984) Proc. of 1984 IEEE Symp. on Security and Privacy , pp. 75-86
    • Goguen, J.1    Meseguer, J.2
  • 22
    • 84976675687 scopus 로고
    • Information transmission in sequential programs
    • Cohen E. Information transmission in sequential programs. ACM SIGOPS Operating Syst. Rev. 11 5 (1977) 133-139
    • (1977) ACM SIGOPS Operating Syst. Rev. , vol.11 , Issue.5 , pp. 133-139
    • Cohen, E.1
  • 23
    • 0037251378 scopus 로고    scopus 로고
    • Language-based information-flow security
    • Sabelfeld A., and Myers A. Language-based information-flow security. IEEE J. Sel. Areas Commun. 21 1 (2003) 5-19
    • (2003) IEEE J. Sel. Areas Commun. , vol.21 , Issue.1 , pp. 5-19
    • Sabelfeld, A.1    Myers, A.2
  • 24
    • 0033751850 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • Leino K., and Joshi R. A semantic approach to secure information flow. Sci. Comput. Programming 37 1-3 (2000) 113-138
    • (2000) Sci. Comput. Programming , vol.37 , Issue.1-3 , pp. 113-138
    • Leino, K.1    Joshi, R.2
  • 26
    • 35048828759 scopus 로고    scopus 로고
    • A model for delimited information release
    • Revised Papers from Mext-NSF-JSPS Int. Symp. on Software Security: Theories and Systems, 2003, Tokyo, Nov. 2003. Futatsugi K., Mizoguchi F., and Yonezaki N. (Eds), Springer, Berlin
    • Sabelfeld A., and Myers A. A model for delimited information release. In: Futatsugi K., Mizoguchi F., and Yonezaki N. (Eds). Revised Papers from Mext-NSF-JSPS Int. Symp. on Software Security: Theories and Systems, 2003, Tokyo, Nov. 2003. Lect. Notes in Comput. Sci. vol. 3233 (2004), Springer, Berlin 174-191
    • (2004) Lect. Notes in Comput. Sci. , vol.3233 , pp. 174-191
    • Sabelfeld, A.1    Myers, A.2
  • 27
    • 0030232849 scopus 로고    scopus 로고
    • Non-interference through determinism
    • Roscoe A., Woodcock J., and Wulf L. Non-interference through determinism. J. Comput. Secur. 4 1 (1996) 27-54
    • (1996) J. Comput. Secur. , vol.4 , Issue.1 , pp. 27-54
    • Roscoe, A.1    Woodcock, J.2    Wulf, L.3
  • 28
    • 0033701251 scopus 로고    scopus 로고
    • Possibilistic definitions of security-an assembly kit
    • CSFW 2000, Cambridge, July 2000, IEEE CS Press, Los Alamitos, CA
    • Mantel H. Possibilistic definitions of security-an assembly kit. Proc. of 13th IEEE Computer Security Foundations Wksh. CSFW 2000, Cambridge, July 2000 (2000), IEEE CS Press, Los Alamitos, CA 185-199
    • (2000) Proc. of 13th IEEE Computer Security Foundations Wksh , pp. 185-199
    • Mantel, H.1
  • 30
    • 43049170808 scopus 로고    scopus 로고
    • Springer, New York URL: http://www.cse.unsw.edu.au/~carrollm/arp/
    • McIver A., and Morgan C. Abstraction, Refinement and Proof for Probabilistic Systems. Technical Monographs in Computer Science (2005), Springer, New York. http://www.cse.unsw.edu.au/~carrollm/arp/ URL: http://www.cse.unsw.edu.au/~carrollm/arp/
    • (2005) Technical Monographs in Computer Science
    • McIver, A.1    Morgan, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.