메뉴 건너뛰기




Volumn , Issue , 2009, Pages 3-9

Secure service composition with symbolic effects

Author keywords

[No Author keywords available]

Indexed keywords

COMPOSITIONALITY; EXECUTION MONITORS; EXECUTION TRACE; LOCAL POLICIES; PARTIAL INFORMATION; PROGRAM FLOW; RUNTIMES; SECURE SERVICES; SECURITY PROPERTIES; SERVICE ORIENTED; TYPE AND EFFECT SYSTEMS;

EID: 77953837414     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SEEFM.2009.13     Document Type: Conference Paper
Times cited : (2)

References (18)
  • 1
    • 84890865854 scopus 로고    scopus 로고
    • Access control based on execution history
    • Martín Abadi and Cédric Fournet. Access control based on execution history. In NDSS, 2003.
    • (2003) NDSS
    • Abadi, M.1    Fournet, C.2
  • 3
    • 24644498665 scopus 로고    scopus 로고
    • History-based access control with local policies
    • Massimo Bartoletti, Pierpaolo Degano, and Gian Luigi Ferrari. History-based access control with local policies. In FoSSaCS, pages 316-332, 2005.
    • (2005) FoSSaCS , pp. 316-332
    • Bartoletti, M.1    Degano, P.2    Ferrari, G.L.3
  • 4
    • 70449384902 scopus 로고    scopus 로고
    • Planning and verifying service composition
    • (Abridged version In Proc. 18th Computer Security Foundations Workshop (CSFW), 2005)
    • Massimo Bartoletti, Pierpaolo Degano, and Gian Luigi Ferrari. Planning and verifying service composition. Journal of Computer Security (JCS), 17(5):799-837, 2009. (Abridged version In Proc. 18th Computer Security Foundations Workshop (CSFW), 2005).
    • (2009) Journal of Computer Security (JCS) , vol.17 , Issue.5 , pp. 799-837
    • Bartoletti, M.1    Degano, P.2    Ferrari, G.L.3
  • 6
    • 0021870594 scopus 로고
    • Algebra of communicating processes with abstraction
    • Jan A. Bergstra and Jan Willem Klop. Algebra of communicating processes with abstraction. Theor. Comput. Sci., 37:77-121, 1985.
    • (1985) Theor. Comput. Sci. , vol.37 , pp. 77-121
    • Bergstra, J.A.1    Klop, J.W.2
  • 7
    • 0034963556 scopus 로고    scopus 로고
    • Model checking security properties of control flow graphs
    • Frédéric Besson, Thomas P. Jensen, and Daniel Le Métayer. Model checking security properties of control flow graphs. Journal of Computer Security, 9(3):217-250, 2001.
    • (2001) Journal of Computer Security , vol.9 , Issue.3 , pp. 217-250
    • Besson, F.1    Jensen, T.P.2    Le Métayer, D.3
  • 8
    • 0002953320 scopus 로고    scopus 로고
    • A symbolic semantics for the pi-calculus
    • Michele Boreale and Rocco De Nicola. A symbolic semantics for the pi-calculus. Inf. Comput., 126(1):34-52, 1996.
    • (1996) Inf. Comput. , vol.126 , Issue.1 , pp. 34-52
    • Boreale, M.1    De Nicola, R.2
  • 9
    • 67650301851 scopus 로고    scopus 로고
    • Contract-driven implementation of choreographies
    • Mario Bravetti, Ivan Lanese, and Gianluigi Zavattaro. Contract-driven implementation of choreographies. In TGC, pages 1-18, 2008.
    • (2008) TGC , pp. 1-18
    • Bravetti, M.1    Lanese, I.2    Zavattaro, G.3
  • 10
    • 33744948281 scopus 로고    scopus 로고
    • Choreography and orchestration: A synergic approach for system design
    • Nadia Busi, Roberto Gorrieri, Claudio Guidi, Roberto Lucchi, and Gianluigi Zavattaro. Choreography and orchestration: A synergic approach for system design. In ICSOC, pages 228-240, 2005.
    • (2005) ICSOC , pp. 228-240
    • Busi, N.1    Gorrieri, R.2    Guidi, C.3    Lucchi, R.4    Zavattaro, G.5
  • 12
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • Jay Ligatti, Lujo Bauer, and David Walker. Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Sec., 4(1-2):2-16, 2005.
    • (2005) Int. J. Inf. Sec. , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 13
    • 43149123592 scopus 로고    scopus 로고
    • Synthesis of web services orchestrators in a timed setting
    • Fabio Martinelli and Ilaria Matteucci. Synthesis of web services orchestrators in a timed setting. In WS-FM, pages 124-138, 2007.
    • (2007) WS-FM , pp. 124-138
    • Martinelli, F.1    Matteucci, I.2
  • 14
    • 0003866744 scopus 로고
    • Ccs without tau's
    • Rocco De Nicola and Matthew Hennessy. Ccs without tau's. In TAPSOFT, Vol.1, pages 138-152, 1987.
    • (1987) TAPSOFT , vol.1 , pp. 138-152
    • De Nicola, R.1    Hennessy, M.2
  • 15
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • Fred B. Schneider. Enforceable security policies. ACM Trans. Inf. Syst. Secur., 3(1):30-50, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 16
    • 35048838770 scopus 로고    scopus 로고
    • History effects and verification
    • Christian Skalka and Scott F. Smith. History effects and verification. In APLAS, pages 107-128, 2004.
    • (2004) APLAS , pp. 107-128
    • Skalka, C.1    Smith, S.F.2
  • 17
    • 77953850520 scopus 로고    scopus 로고
    • Gabriele Costa's web page. extended version
    • Gabriele Costa's web page. Secure service composition with symbolic effects (extended version), 2009. http://www.di.unipi.it/~costa/data/papers/ssc- extended.pdf.
    • (2009) Secure Service Composition with Symbolic Effects


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.