메뉴 건너뛰기




Volumn 2, Issue , 2009, Pages 324-328

On information flow forensics in business application scenarios

Author keywords

[No Author keywords available]

Indexed keywords

BUSINESS APPLICATIONS; BUSINESS SOFTWARE; COVERT CHANNELS; INFORMATION FLOW POLICIES; INFORMATION FLOWS; POSTERIORI; RESEARCH CHALLENGES; SECURITY ANALYSIS; SOFTWARE APPLICATIONS;

EID: 70449659976     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSAC.2009.154     Document Type: Conference Paper
Times cited : (11)

References (28)
  • 1
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B. W. Lampson, "A note on the confinement problem," Comm. the ACM, vol.16, no.10, pp. 613-615, 1973.
    • (1973) Comm. the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 2
    • 0037251378 scopus 로고    scopus 로고
    • Language-based information-flow security
    • A. Sabelfeld and A. C. Myers, "Language-based information-flow security," IEEE J-SAC, vol.21, no.1, pp. 5-19, 2003.
    • (2003) IEEE J-SAC , vol.21 , Issue.1 , pp. 5-19
    • Sabelfeld, A.1    Myers, A.C.2
  • 3
    • 3543075807 scopus 로고    scopus 로고
    • An access control framework for business processes for web services
    • H. Koshutanski and F. Massacci, "An access control framework for business processes for web services," in ACM workshop on XML security. 2003, pp. 15-24.
    • (2003) ACM Workshop on XML Security , pp. 15-24
    • Koshutanski, H.1    Massacci, F.2
  • 4
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • R. Sandhu and P. Samarati, "Access control: Principles and practice," IEEE Comm. Mag., vol.32, no.9, pp. 40-48, 1994.
    • (1994) IEEE Comm. Mag. , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.1    Samarati, P.2
  • 5
    • 0242540392 scopus 로고    scopus 로고
    • An access control language for web services
    • E. G. Sirer and K. Wang, "An access control language for web services," in ACM SACMAT. 2002, pp. 23-30.
    • (2002) ACM SACMAT , pp. 23-30
    • Sirer, E.G.1    Wang, K.2
  • 7
    • 35348884907 scopus 로고    scopus 로고
    • Exposing private information by timing web applications
    • A. Bortz, D. Boneh, and P. Nandy, "Exposing private information by timing web applications," in Conf. World Wide Web. 2007, pp. 621-628.
    • (2007) Conf. World Wide Web , pp. 621-628
    • Bortz, A.1    Boneh, D.2    Nandy, P.3
  • 8
    • 18844454571 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • D. Brumley and D. Boneh, "Remote timing attacks are practical," Comp. Net., vol.48, no.5,pp.701-716, 2005.
    • (2005) Comp. Net. , vol.48 , Issue.5 , pp. 701-716
    • Brumley, D.1    Boneh, D.2
  • 10
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Apr.
    • K. J. Biba, "Integrity considerations for secure computer systems," The Mitre Corp., Tech. Rep., Apr. 1977.
    • (1977) The Mitre Corp., Tech. Rep.
    • Biba, K.J.1
  • 11
    • 0020299523 scopus 로고
    • Security policies and security models
    • J. A. Goguen and J. Meseguer, "Security policies and security models," in IEEE SSP, 1982, pp. 11-20.
    • (1982) IEEE SSP , pp. 11-20
    • Goguen, J.A.1    Meseguer, J.2
  • 14
    • 57849117582 scopus 로고    scopus 로고
    • Compliance monitor for early warning risk determination
    • October
    • R. Accorsi, Y. Sato, and S. Kai, "Compliance monitor for early warning risk determination," Wirtschaftsinfor-matik, vol.50, no.5, October 2008 pp. 375-382.
    • (2008) Wirtschaftsinfor-matik , vol.50 , Issue.5 , pp. 375-382
    • Accorsi, R.1    Sato, Y.2    Kai, S.3
  • 16
    • 49049083502 scopus 로고    scopus 로고
    • Electronic voting scheme to maintain anonymity in small-scale election by hiding the number of votes
    • T. Endo, I. Echizen, and H. Yoshiura, "Electronic voting scheme to maintain anonymity in small-scale election by hiding the number of votes," in ARES Conference. 2008, pp. 1287-1293.
    • (2008) ARES Conference , pp. 1287-1293
    • Endo, T.1    Echizen, I.2    Yoshiura, H.3
  • 17
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • F. Schneider, "Enforceable Security Policies," ACM TISSEC, vol.3, no.1, pp. 30-50, 2000.
    • (2000) ACM TISSEC , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.1
  • 19
    • 35048880192 scopus 로고    scopus 로고
    • Dynamic dependency monitoring to secure information flow
    • P. Shroff, S. F. Smith, and M. Thober, "Dynamic dependency monitoring to secure information flow," in IEEE CSF, 2007, pp. 203-217.
    • (2007) IEEE CSF , pp. 203-217
    • Shroff, P.1    Smith, S.F.2    Thober, M.3
  • 20
    • 24644445710 scopus 로고    scopus 로고
    • A theorem proving approach to analysis of secure information flow
    • ser. LNCS
    • Á. Darvas, R. Hähnle, and D. Sands, "A theorem proving approach to analysis of secure information flow," SPC, ser. LNCS, vol.3450. 2005, pp. 193-209.
    • (2005) SPC , vol.3450 , pp. 193-209
    • Darvas, Á.1    Hähnle, R.2    Sands, D.3
  • 21
    • 58049149107 scopus 로고    scopus 로고
    • Verification condition generation for conditional information flow
    • T. Amtoft and A. Banerjee, "Verification condition generation for conditional information flow," in ACM FMSE. 2007, pp. 2-11.
    • (2007) ACM FMSE. , pp. 2-11
    • Amtoft, T.1    Banerjee, A.2
  • 22
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, C. Irvine, and G. Smith, "A sound type system for secure flow analysis," JCS, vol.4, no.2-3, pp. 167-187, 1996.
    • (1996) JCS , vol.4 , Issue.2-3 , pp. 167-187
    • Volpano, D.1    Irvine, C.2    Smith, G.3
  • 23
    • 34250357872 scopus 로고    scopus 로고
    • Information flow control for java based on path conditions in dependence graphs
    • C. Hammer, J. Krinke, and G. Snelting, "Information flow control for java based on path conditions in dependence graphs," in IEEE ISSSE. 2006, pp. 87-96.
    • (2006) IEEE ISSSE , pp. 87-96
    • Hammer, C.1    Krinke, J.2    Snelting, G.3
  • 24
    • 0036037318 scopus 로고    scopus 로고
    • Information flow inference for ML
    • F. Pottier and V. Simonet, "Information flow inference for ML," in ACM TOPLAS, vol.37. 2002, pp. 319-330.
    • (2002) ACM TOPLAS , vol.37 , pp. 319-330
    • Pottier, F.1    Simonet, V.2
  • 26
    • 51749111025 scopus 로고    scopus 로고
    • Challenges for information-flow security
    • S. Zdancewic, "Challenges for information-flow security," PLID, 2004.
    • (2004) PLID
    • Zdancewic, S.1
  • 27
    • 0030672129 scopus 로고    scopus 로고
    • A general theory of security properties
    • A. Zakinthinos and E. S. Lee, "A general theory of security properties," in IEEE SSP, 1997, pp. 94-102.
    • (1997) IEEE SSP , pp. 94-102
    • Zakinthinos, A.1    Lee, E.S.2
  • 28
    • 0033701251 scopus 로고    scopus 로고
    • Possibilistic definitions of security - An assembly kit
    • H. Mantel, "Possibilistic Definitions of Security - An Assembly Kit," in IEEE CSFW. 2000, pp. 185-199.
    • (2000) IEEE CSFW , pp. 185-199
    • Mantel, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.