메뉴 건너뛰기




Volumn , Issue , 2009, Pages 221-236

A logic of secure systems and its application to trusted computing

Author keywords

[No Author keywords available]

Indexed keywords

CODE INTEGRITY; CONCURRENT PROGRAMMING LANGUAGES; CRYPTOGRAPHIC OPERATIONS; EXECUTION INTEGRITY; NETWORK COMMUNICATIONS; PROGRAMMING MODELS; PROOF SYSTEM; REMOTE ATTESTATION; SECURE SYSTEM; SHARED MEMORIES; SYSTEM INTERFACES; TRUSTED COMPUTING;

EID: 70449640065     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2009.16     Document Type: Conference Paper
Times cited : (81)

References (41)
  • 2
    • 24144442872 scopus 로고    scopus 로고
    • A derivation system and compositional logic for security protocols
    • A. Datta, A. Derek, J. C. Mitchell, and D. Pavlovic, "A derivation system and compositional logic for security protocols," Journal of Computer Security, vol.13, no.3, pp. 423-482, 2005.
    • (2005) Journal of Computer Security , vol.13 , Issue.3 , pp. 423-482
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Pavlovic, D.4
  • 4
    • 0141751776 scopus 로고    scopus 로고
    • A compositional logic for proving security properties of protocols
    • N. Durgin, J. C. Mitchell, and D. Pavlovic, "A compositional logic for proving security properties of protocols," Journal of Computer Security, vol.11, pp. 677-721, 2003.
    • (2003) Journal of Computer Security , vol.11 , pp. 677-721
    • Durgin, N.1    Mitchell, J.C.2    Pavlovic, D.3
  • 7
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • J. Saltzer and M. Schroeder, "The protection of information in computer systems," Proceedings of the IEEE, vol.63, no.9, pp. 1278-1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 10
    • 84945708698 scopus 로고
    • An axiomatic basis for computer programming
    • C. A. R. Hoare, "An axiomatic basis for computer programming," Communications of the ACM, vol.12, no.10, pp. 576-580, 1969.
    • (1969) Communications of the ACM , vol.12 , Issue.10 , pp. 576-580
    • Hoare, C.A.R.1
  • 13
    • 21644486314 scopus 로고    scopus 로고
    • Revision 1.4, August
    • Trusted Computing Group, "TCG Specification Architecture Overview, Specification Revision 1.4," https://www.trustedcomputinggroup.org/groups/ TCG-1-4-Architecture Overview.pdf, August 2007.
    • (2007) TCG Specification Architecture Overview, Specification
  • 15
    • 70449649098 scopus 로고    scopus 로고
    • AMD64 virtualization: Secure virtual machine architecture reference manual
    • AMD Publication no. 33047 rev. 3.01, May
    • Advanced Micro Devices, "AMD64 virtualization: Secure virtual machine architecture reference manual," AMD Publication no.33047 rev. 3.01, May 2005.
    • (2005) Advanced Micro Devices
  • 17
    • 70449691848 scopus 로고    scopus 로고
    • A logic of secure systems and its application to trusted computing
    • Carnegie Mellon University
    • A. Datta, J. Franklin, D. Garg, and D. Kaynar, "A logic of secure systems and its application to trusted computing," Carnegie Mellon University, Tech. Rep. CMU-CyLab-09- 001, 2009.
    • (2009) Tech. Rep. CMU-CyLab-09-001
    • Datta, A.1    Franklin, J.2    Garg, D.3    Kaynar, D.4
  • 21
    • 70449688892 scopus 로고    scopus 로고
    • Hybridizing a logical framework
    • ser. Electronic Notes in Computer Science, August
    • J. Reed, "Hybridizing a logical framework," in International Workshop on Hybrid Logic 2006 (HyLo 2006), ser. Electronic Notes in Computer Science, August 2006.
    • (2006) International Workshop on Hybrid Logic 2006 (HyLo 2006)
    • Reed, J.1
  • 23
    • 33646393954 scopus 로고    scopus 로고
    • May, [Online]. Available
    • "Secure virtual machine architecture reference manual." AMD Corp., May 2005. [Online]. Available: http://www.amd.com/us-en/assets/content- type/-white-papers-and-tech-docs/33047.pdf.
    • (2005) Secure Virtual Machine Architecture Reference Manual
  • 41
    • 37149032670 scopus 로고    scopus 로고
    • Master's thesis, Massachusetts Institute of Technology
    • A. H. Lin, "Automated analysis of security apis," Master's thesis, Massachusetts Institute of Technology, 2005
    • (2005) Automated Analysis of Security Apis
    • Lin, A.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.