메뉴 건너뛰기




Volumn , Issue , 2010, Pages 215-227

Required information release

Author keywords

Algorithmic knowledge; Declassification; Information flow; Information release

Indexed keywords

ALGORITHMIC KNOWLEDGE; DECLASSIFICATION; FUNCTIONAL REQUIREMENT; INFORMATION FLOW CONTROL; INFORMATION FLOWS; INFORMATION RELEASE; INFORMATION SECURITY REQUIREMENTS; SEMANTIC SECURITY; TYPE SYSTEMS;

EID: 77957606221     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2010.22     Document Type: Conference Paper
Times cited : (7)

References (30)
  • 7
    • 38049082649 scopus 로고    scopus 로고
    • What, indeed, is intransitive noninterference?
    • ser. Lecture Notes in Computer Science, Springer, Sep
    • R. van der Meyden, "What, indeed, is intransitive noninterference?" in Proceedings of the 12th European Symposium On Research In Computer Security, ser. Lecture Notes in Computer Science, vol. 4734. Springer, Sep. 2007, pp. 235-250.
    • (2007) Proceedings of the 12th European Symposium on Research in Computer Security , vol.4734 , pp. 235-250
    • Van Der Meyden, R.1
  • 15
    • 33645745601 scopus 로고    scopus 로고
    • Deductive algorithmic knowledge
    • R. Pucella, "Deductive algorithmic knowledge, " Journal of Logic and Computation, vol. 16, no. 2, pp. 287- 309, 2006.
    • (2006) Journal of Logic and Computation , vol.16 , Issue.2 , pp. 287-309
    • Pucella, R.1
  • 17
  • 21
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Jul.
    • D. E. Denning and P. J. Denning, "Certification of programs for secure information flow, " Communications of the ACM, vol. 20, no. 7, pp. 504-513, Jul. 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 25
    • 34548715313 scopus 로고    scopus 로고
    • Gradual release: Unifying declassification, encryption and key release policies
    • IEEE Computer Society
    • -, "Gradual release: Unifying declassification, encryption and key release policies, " in Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, 2007, pp. 207-221.
    • (2007) Proceedings of the IEEE Symposium on Security and Privacy , pp. 207-221


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.