메뉴 건너뛰기




Volumn 5850 LNCS, Issue , 2009, Pages 289-304

Sums and lovers: Case studies in security, compositionality and refinement

Author keywords

Compositional semantics; Formalised secrecy; Hierarchical security reasoning; Refinement of security

Indexed keywords

COMPOSITIONAL SEMANTICS; COMPOSITIONALITY; FORMAL DEVELOPMENT; FORMAL TECHNIQUES; GENERALISATION; MODEL CHECKER; PROGRAM ALGEBRA; SECURE PROTOCOLS; SECURITY REQUIREMENTS; SECURITY-AWARE;

EID: 70649085848     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-05089-3_19     Document Type: Conference Paper
Times cited : (11)

References (23)
  • 1
    • 70649110129 scopus 로고    scopus 로고
    • available at
    • Appendices are available at, www.cse.unsw.edu.au/~carrollm/probs/ bibliographyBody.html#McIver:09
    • Appendices are
  • 2
    • 70649112421 scopus 로고    scopus 로고
    • Private communication February
    • Černý, P.: Private communication (February 2009)
    • (2009)
    • Černý, P.1
  • 3
    • 33746373966 scopus 로고    scopus 로고
    • Preserving secrecy under refinement
    • Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
    • Alur, R., Černý, P., Zdancewic, S.: Preserving secrecy under refinement. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 107-118. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4052 , pp. 107-118
    • Alur, R.1    Černý, P.2    Zdancewic, S.3
  • 5
    • 50349096677 scopus 로고    scopus 로고
    • Coble, A.: Formalized information-theoretic proofs of privacy using the HOL-4 theorem-prover. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, 5134, pp. 77-98. Springer, Heidelberg (2008)
    • Coble, A.: Formalized information-theoretic proofs of privacy using the HOL-4 theorem-prover. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 77-98. Springer, Heidelberg (2008)
  • 6
    • 84937417656 scopus 로고    scopus 로고
    • Engelhardt, K., van der Meyden, R., Moses, Y.: A refinement theory that supports reasoning about knowledge and time. In: Nieuwenhuis, R., Voronkov, A. (eds.) LPAR 2001. LNCS (LNAI), 2250, pp. 125-141. Springer, Heidelberg (2001)
    • Engelhardt, K., van der Meyden, R., Moses, Y.: A refinement theory that supports reasoning about knowledge and time. In: Nieuwenhuis, R., Voronkov, A. (eds.) LPAR 2001. LNCS (LNAI), vol. 2250, pp. 125-141. Springer, Heidelberg (2001)
  • 8
    • 84985387198 scopus 로고
    • A couple of novelties in the propositional calculus. Zeitschr für Math
    • Hoare, C.A.R.: A couple of novelties in the propositional calculus. Zeitschr für Math. Logik und Grundlagen der Math. 31(2), 173-178 (1985)
    • (1985) Logik und Grundlagen der Math , vol.31 , Issue.2 , pp. 173-178
    • Hoare, C.A.R.1
  • 9
    • 0033751850 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • Leino, K.R.M., Joshi, R.: A semantic approach to secure information flow. Science of Computer Programming 37(1-3), 113-138 (2000)
    • (2000) Science of Computer Programming , vol.37 , Issue.1-3 , pp. 113-138
    • Leino, K.R.M.1    Joshi, R.2
  • 11
    • 0034836335 scopus 로고    scopus 로고
    • Preserving information flow properties under refinement
    • Mantel, H.: Preserving information flow properties under refinement. In: Proc. IEEE Symp. Security and Privacy, pp. 78-91 (2001)
    • (2001) Proc. IEEE Symp. Security and Privacy , pp. 78-91
    • Mantel, H.1
  • 13
    • 70649091351 scopus 로고    scopus 로고
    • Morgan, C.C.: Programming from Specifications, 2nd edn. Prentice-Hall, Engle-wood Cliffs (1994), web.comlab.ox.ac.uk/oucl/publications/books/PfS/
    • Morgan, C.C.: Programming from Specifications, 2nd edn. Prentice-Hall, Engle-wood Cliffs (1994), web.comlab.ox.ac.uk/oucl/publications/books/PfS/
  • 14
    • 33746064873 scopus 로고    scopus 로고
    • Morgan, C.C.: The Shadow Knows: Refinement of ignorance in sequential programs. In: Uustalu, T. (ed.) Math. Prog. Construction. LNCS, 4014, pp. 359-378. Springer, Heidelberg (2006) Treats Dining Cryptographers
    • Morgan, C.C.: The Shadow Knows: Refinement of ignorance in sequential programs. In: Uustalu, T. (ed.) Math. Prog. Construction. LNCS, vol. 4014, pp. 359-378. Springer, Heidelberg (2006) Treats Dining Cryptographers
  • 15
    • 67349149975 scopus 로고    scopus 로고
    • The Shadow Knows: Refinement of ignorance in sequential programs
    • Treats Oblivious Transfer
    • Morgan, C.C.: The Shadow Knows: Refinement of ignorance in sequential programs. Science of Computer Programming 74(8) (2009) Treats Oblivious Transfer
    • (2009) Science of Computer Programming , vol.74 , Issue.8
    • Morgan, C.C.1
  • 17
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Technical Report TR-81, Harvard University
    • Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard University (1981), http://eprint.iacr.org/2005/187
    • (1981)
    • Rabin, M.O.1
  • 18
    • 0041965552 scopus 로고    scopus 로고
    • Unconditionally secure commitment and oblivious transfer schemes using private channels and a trusted initialiser
    • Technical report, M.I.T
    • Rivest, R.: Unconditionally secure commitment and oblivious transfer schemes using private channels and a trusted initialiser. Technical report, M.I.T (1999), http://theory.lcs.mit.edu/~rivest/Rivest-commitment.pdf
    • (1999)
    • Rivest, R.1
  • 22
    • 70649092441 scopus 로고    scopus 로고
    • http://www.deploy-project.eu


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.