메뉴 건너뛰기




Volumn 36, Issue 5, 2010, Pages 719-734

Time and probability-based information flow analysis

Author keywords

information flow analysis; multilevel security; Probabilistic timed automata; weak bisimulation

Indexed keywords

COVERT CHANNELS; INFORMATION FLOW ANALYSIS; INFORMATION FLOWS; MULTI-LEVEL SECURITY; MULTI-LEVEL SYSTEMS; POSSIBILISTIC; PROBABILISTIC TIMED AUTOMATA; SECURITY PROPERTIES; WEAK BISIMULATION;

EID: 77957749524     PISSN: 00985589     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSE.2010.4     Document Type: Article
Times cited : (16)

References (45)
  • 2
    • 3042529082 scopus 로고    scopus 로고
    • A process-algebraic approach for the analysis of probabilistic non interference
    • A. Aldini, M. Bravetti, and R. Gorrieri, "A Process-Algebraic Approach for the Analysis of Probabilistic Non Interference," J. Computer Security, Vol. 12, pp. 191-245, 2004.
    • (2004) J. Computer Security , vol.12 , pp. 191-245
    • Aldini, A.1    Bravetti, M.2    Gorrieri, R.3
  • 3
    • 44249128398 scopus 로고    scopus 로고
    • Estimating the maximum information leakage
    • A. Aldini and A. Di Pierro, "Estimating the Maximum Information Leakage," Int'l J. Information Security, Vol. 7, pp. 219-242, 2008.
    • (2008) Int'l J. Information Security , vol.7 , pp. 219-242
    • Aldini, A.1    Di Pierro, A.2
  • 7
    • 0037834671 scopus 로고    scopus 로고
    • A decidable notion of timed non interference
    • R. Barbuti and L. Tesei, "A Decidable Notion of Timed Non Interference," Fundamenta Informaticae, Vol. 54, pp. 137-150, 2003.
    • (2003) Fundamenta Informaticae , vol.54 , pp. 137-150
    • Barbuti, R.1    Tesei, L.2
  • 8
    • 0037427688 scopus 로고    scopus 로고
    • On probabilistic timed automata
    • D. Beauquier, "On Probabilistic Timed Automata," Theoretical Computer Science, Vol. 292, pp. 65-84, 2003.
    • (2003) Theoretical Computer Science , vol.292 , pp. 65-84
    • Beauquier, D.1
  • 10
    • 67349145950 scopus 로고    scopus 로고
    • Quantifying information leakage in process calculi
    • M. Boreale, "Quantifying Information Leakage in Process Calculi," Information and Computation, Vol. 207, pp. 699-725, 2009.
    • (2009) Information and Computation , vol.207 , pp. 699-725
    • Boreale, M.1
  • 14
    • 84947796708 scopus 로고
    • Decidability of bisimulation equivalences for parallel timer processes
    • K. Cerans, "Decidability of Bisimulation Equivalences for Parallel Timer Processes," Proc. Int'l Conf. Computer Aided Verification, pp. 302-315, 1992.
    • (1992) Proc. Int'l Conf. Computer Aided Verification , pp. 302-315
    • Cerans, K.1
  • 15
    • 20844445346 scopus 로고    scopus 로고
    • Quantitative information flow, relations and polymorphic types
    • D. Clark, S. Hunt, and P. Malacaria, "Quantitative Information Flow, Relations and Polymorphic Types," J. Logic and Computation, Vol. 18, pp. 181-199, 2005.
    • (2005) J. Logic and Computation , vol.18 , pp. 181-199
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 18
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • D. Chaum, "The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability," J. Cryptology, Vol. 1, pp. 65-75, 1988.
    • (1988) J. Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 26
    • 84974776068 scopus 로고
    • A classification of security properties
    • R. Focardi and R. Gorrieri, "A Classification of Security Properties," J. Computer Security, Vol. 3, pp. 5-33, 1995.
    • (1995) J. Computer Security , vol.3 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 30
    • 84974759639 scopus 로고
    • Toward a mathematical foundation for information flow security
    • J.W. Gray III, "Toward a Mathematical Foundation for Information Flow Security," J. Computer Security, Vol. 1, pp. 255-294, 1992.
    • (1992) J. Computer Security , vol.1 , pp. 255-294
    • Gray III, J.W.1
  • 34
    • 0037036274 scopus 로고    scopus 로고
    • Automatic verification of real-time systems with discrete probability distribution
    • M. Kwiatkowska, G. Norman, R. Segala, and J. Sproston, "Automatic Verification of Real-Time Systems with Discrete Probability Distribution," Theoretical Computer Science, Vol. 282, pp. 101-150, 2002.
    • (2002) Theoretical Computer Science , vol.282 , pp. 101-150
    • Kwiatkowska, M.1    Norman, G.2    Segala, R.3    Sproston, J.4
  • 40
    • 0006476072 scopus 로고    scopus 로고
    • Time abstracted bisimulation: Implicit specifications and decidability
    • K.G. Larsen and Y. Wang, "Time Abstracted Bisimulation: Implicit Specifications and Decidability," Information and Computation, Vol. 134, pp. 75-101, 1997.
    • (1997) Information and Computation , vol.134 , pp. 75-101
    • Larsen, K.G.1    Wang, Y.2
  • 41
  • 45
    • 0000737870 scopus 로고
    • Real-time behaviour of asynchronous agents
    • Y. Wang, "Real-Time Behaviour of Asynchronous Agents," Proc. Int'l Conf. Concurrency Theory, pp. 502-520, 1990.
    • (1990) Proc. Int'l Conf. Concurrency Theory , pp. 502-520
    • Wang, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.