메뉴 건너뛰기




Volumn , Issue , 2010, Pages 28-43

Quantification of integrity

Author keywords

Database privacy; Information theory; Integrity; Quantitative information flow

Indexed keywords

CHANNEL OUTPUT; DATABASE PRIVACY; IMPLEMENTATION ERROR; INFORMATION FLOWS; INTEGRITY; INTEGRITY MEASURES; NOISY CHANNEL; QUANTITATIVE INFORMATION;

EID: 77957559995     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2010.10     Document Type: Conference Paper
Times cited : (24)

References (51)
  • 3
    • 0020762394 scopus 로고
    • Security mechanisms in highlevel network protocols
    • Jun.
    • V. L. Voydock and S. T. Kent, "Security mechanisms in highlevel network protocols, " Computing Surveys, vol. 15, no. 2, Jun. 1983.
    • (1983) Computing Surveys , vol.15 , Issue.2
    • Voydock, V.L.1    Kent, S.T.2
  • 4
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • Apr.
    • D. D. Clark and D. R. Wilson, "A comparison of commercial and military computer security policies, " in Proc. IEEE Symposium on Security and Privacy, Apr. 1987, pp. 184-194.
    • (1987) Proc. IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 6
    • 77957599846 scopus 로고
    • Information technology security evaluation criteria: Provisional harmonised criteria
    • Commission of the European Communities (ECSC, EEC, EAEC), ", " Jun., 314, Version 1.2
    • Commission of the European Communities (ECSC, EEC, EAEC), "Information Technology Security Evaluation Criteria: Provisional harmonised criteria, " Jun. 1991, document COM(90) 314, Version 1.2.
    • (1991) Document COM , Issue.90
  • 11
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in Java applications with static analysis
    • Aug.
    • V. B. Livshits and M. S. Lam, "Finding security vulnerabilities in Java applications with static analysis, " in Proc. USENIX Security Symposium, Aug. 2005, pp. 271-286.
    • (2005) Proc. USENIX Security Symposium , pp. 271-286
    • Livshits, V.B.1    Lam, M.S.2
  • 12
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis and signature generation of exploits on commodity software
    • Feb., available from
    • J. Newsome and D. Song, "Dynamic taint analysis for automatic detection, analysis and signature generation of exploits on commodity software, " in Proc. Symposium on Network and Distributed System Security, Feb. 2005, available from http://www.isoc.org/isoc/conferences/ndss/05/proceedings/papers/ taintcheck.pdf.
    • (2005) Proc. Symposium on Network and Distributed System Security
    • Newsome, J.1    Song, D.2
  • 13
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • Aug.
    • W. Xu, S. Bhatkar, and R. Sekar, "Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks, " in Proc. USENIX Security Symposium, Aug. 2006, pp. 121-136.
    • (2006) Proc. USENIX Security Symposium , pp. 121-136
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3
  • 14
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Apr.
    • K. Biba, "Integrity considerations for secure computer systems, " MITRE Corporation, Tech. Rep. MTR-3153, Apr. 1977.
    • (1977) MITRE Corporation, Tech. Rep. MTR-3153
    • Biba, K.1
  • 15
    • 20844445346 scopus 로고    scopus 로고
    • Quantitative information flow, relations and polymorphic types
    • D. Clark, S. Hunt, and P. Malacaria, "Quantitative information flow, relations and polymorphic types, " Journal of Logic and Computation, vol. 18, no. 2, pp. 181-199, 2005.
    • (2005) Journal of Logic and Computation , vol.18 , Issue.2 , pp. 181-199
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 18
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • 623-656
    • C. E. Shannon, "A mathematical theory of communication, " Bell System Technical Journal, vol. 27, pp. 379-423, 623- 656, 1948.
    • (1948) Bell System Technical Journal , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 22
    • 34249899908 scopus 로고    scopus 로고
    • A static analysis for quantifying information flow in a simple imperative language
    • D. Clark, S. Hunt, and P. Malacaria, "A static analysis for quantifying information flow in a simple imperative language, " Journal of Computer Security, vol. 15, no. 3, pp. 321-371, 2007.
    • (2007) Journal of Computer Security , vol.15 , Issue.3 , pp. 321-371
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 23
  • 31
    • 0033105319 scopus 로고    scopus 로고
    • Using Boolean reasoning to anonymize databases
    • A. Øhrn and L. Ohno-Machado, "Using Boolean reasoning to anonymize databases, " Artificial Intelligence in Medicine, vol. 15, no. 3, pp. 235-254, 1999.
    • (1999) Artificial Intelligence in Medicine , vol.15 , Issue.3 , pp. 235-254
    • Øhrn, A.1    Ohno-Machado, L.2
  • 33
    • 0026157130 scopus 로고
    • Toward a mathematical foundation for information flow security
    • May
    • J. W. Gray, III, "Toward a mathematical foundation for information flow security, " in Proc. IEEE Symposium on Security and Privacy, May 1991, pp. 21-35.
    • (1991) Proc. IEEE Symposium on Security and Privacy , pp. 21-35
    • Gray III, J.W.1
  • 39
    • 0003400251 scopus 로고    scopus 로고
    • Secure computer systems: Mathematical foundations
    • Mar.
    • D. E. Bell and L. J. LaPadula, "Secure computer systems: Mathematical foundations, " MITRE Corporation, Tech. Rep. 2547, Volume1, Mar. 1973.
    • (2547) MITRE Corporation, Tech. Rep. , vol.1
    • Bell, D.E.1    Lapadula, L.J.2
  • 44
    • 84877700103 scopus 로고    scopus 로고
    • SIF: Enforcing confidentiality and integrity in web applications
    • Aug.
    • S. Chong, K. Vikram, and A. C. Myers, "SIF: Enforcing confidentiality and integrity in web applications, " in Proc. USENIX Security Symposium, Aug. 2007, pp. 1-16.
    • (2007) Proc. USENIX Security Symposium , pp. 1-16
    • Chong, S.1    Vikram, K.2    Myers, A.C.3
  • 51
    • 37049224492 scopus 로고
    • The need of psychological training
    • Mar., available from
    • E. W. Scripture, "The need of psychological training, " Science, vol. 19, no. 474, pp. 127-128, Mar. 1892, available from http://www.jstor.org/stable/1766918.
    • (1892) Science , vol.19 , Issue.474 , pp. 127-128
    • Scripture, E.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.