메뉴 건너뛰기




Volumn 5, Issue , 2010, Pages 839-845

A security model for personal information security management based on partial approximative set theory

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; SECURITY OF DATA;

EID: 79551545010     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/imcsit.2010.5679939     Document Type: Conference Paper
Times cited : (4)

References (33)
  • 1
    • 0022420723 scopus 로고
    • Defining liveness
    • (Oct.)
    • Alpern, B., " Schneider, F., Defining liveness. Inf. Process. Lett. 21, 4 (Oct.), 181-185, 1985.
    • (1985) Inf. Process. Lett. , vol.21 , Issue.4 , pp. 181-185
    • Alpern, B.1    Schneider, F.2
  • 8
    • 0000911801 scopus 로고
    • Abstract interpretation and application to logic programs
    • Cousot, P., " Cousot, R., Abstract interpretation and application to logic programs, Journal of Logic Programming, 13(2-3):103-179, 1992. http://www.di.ens.fr/-cousot/COUSOTpapers/JLP92.shtml.
    • (1992) Journal of Logic Programming , vol.13 , Issue.2-3 , pp. 103-179
    • Cousot, P.1    Cousot, R.2
  • 9
    • 79955028147 scopus 로고    scopus 로고
    • Partial approximative set theory
    • Ponta Delgada (Azores), Portugal, June 30 - July 4, 2010, Abstract and Handout Booklet, To appear
    • Csajbók, Z., Partial Approximative Set Theory, In Programs, Proofs, Processes, Sixth Conference on Computability in Europe, CiE 2010, Ponta Delgada (Azores), Portugal, June 30 - July 4, 2010, Abstract and Handout Booklet, 2010. To appear.
    • (2010) Programs, Proofs, Processes, Sixth Conference on Computability in Europe, CiE 2010
    • Csajbók, Z.1
  • 10
    • 79551566257 scopus 로고    scopus 로고
    • Partial approximative set theory: A view from galois connections
    • Kovács, Emöd (ed.) et al., January 27-30, Eger, Hungary. Eger: Eszterházy Károly College. To appear
    • Csajbók, Z., Partial Approximative Set Theory: A View from Galois Connections, In Kovács, Emöd (ed.) et al., Proceedings of the 8th international conference on applied informatics (ICAI 2010), January 27-30, 2010, Eger, Hungary. Eger: Eszterházy Károly College. To appear.
    • (2010) Proceedings of the 8th International Conference on Applied Informatics (ICAI 2010)
    • Csajbók, Z.1
  • 14
    • 35248813940 scopus 로고    scopus 로고
    • Approximation operators in qualitative data analysis
    • H. de Swart et al. (Eds.): TARSKI, Springer-Verlag, Berlin, Heidelberg
    • Düntsch, I., " Gediga, G., Approximation Operators in Qualitative Data Analysis, In: H. de Swart et al. (Eds.): TARSKI, Lecture Notes in Computer Science Vol. 2929, Springer-Verlag, Berlin, Heidelberg, 214-230, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2929 , pp. 214-230
    • Düntsch, I.1    Gediga, G.2
  • 16
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (Part I: Information flow)
    • volume 2171 of Lecture Notes in Computer Science, Springer
    • Focardi, R., " Gorrieri, R., Classification of security properties (Part I: Information flow). In Foundations of Security Analysis and Design 2000, volume 2171 of Lecture Notes in Computer Science, pages 331-396. Springer, 2001.
    • (2001) Foundations of Security Analysis and Design 2000 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 19
    • 38049075550 scopus 로고    scopus 로고
    • Lattice theory for rough sets
    • LNCS, Springer, Heidelberg
    • Järvinen, J., Lattice theory for rough sets, In: Transactions on Rough Sets VI. LNCS, vol. 4374, Springer, Heidelberg, 2007, pp. 400-498.
    • (2007) Transactions on Rough Sets VI , vol.4374 , pp. 400-498
    • Järvinen, J.1
  • 20
    • 0017472779 scopus 로고
    • Proving the correctness of multiprocess programs
    • Mar.
    • Lamport, L., Proving the correctness of multiprocess programs. IEEE Transactions of Software Engineering, 3(2):125-143, Mar. 1977.
    • (1977) IEEE Transactions of Software Engineering , vol.3 , Issue.2 , pp. 125-143
    • Lamport, L.1
  • 21
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • February
    • Ligatti, J., " Bauer, L., " Walker, D., Edit Automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security, 4(1-2):2-16, February 2005.
    • (2005) International Journal of Information Security , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 23
    • 85034819445 scopus 로고
    • Trace theory
    • W. Brauer et al. editors, Petri Nets, number 255 in Lecture Notes in Computer Science, Berlin-Heidelberg-New York, Springer
    • Mazurkiewicz, A., Trace Theory, In W. Brauer et al., editors, Petri Nets, Applications and Relationship to other Models of Concurrency, number 255 in Lecture Notes in Computer Science, pages 279-324, Berlin-Heidelberg-New York, 1987, Springer.
    • (1987) Applications and Relationship to Other Models of Concurrency , pp. 279-324
    • Mazurkiewicz, A.1
  • 30
    • 0012889295 scopus 로고    scopus 로고
    • A language-based approach to security
    • Lecture Notes in Computer Science, Springer-Verlag
    • Schneider, F.B., " Morrisett, G., " Harper, R., A Language-Based Approach to Security. In: Informatics: 10 Years Back, 10 Years Ahead. Lecture Notes in Computer Science, Vol. 2000. Springer-Verlag, 2001. pp. 86-101.
    • (2001) Informatics: 10 Years Back, 10 Years Ahead , vol.2000 , pp. 86-101
    • Schneider, F.B.1    Morrisett, G.2    Harper, R.3
  • 31
    • 0021011078 scopus 로고
    • Powerdomains and predicate transformers: A topological view
    • J. Diaz, editor, Berlin, Springer-Verlag. Lecture Notes in Computer Science Vol. 154
    • Smyth, M.B., Powerdomains and predicate transformers: a topological view, In J. Diaz, editor, Automata, Languages and Programming, pages 662-675, Berlin, 1983. Springer-Verlag. Lecture Notes in Computer Science Vol. 154.
    • (1983) Automata, Languages and Programming , pp. 662-675
    • Smyth, M.B.1
  • 32
    • 0001744565 scopus 로고
    • Topology
    • Abramsky, S." Gabbay, D.M." Maibaum, T.S.E. (eds.), Background: Mathematical Stuctures, Clarendon Press, Oxford
    • Smyth, M.B., Topology, In Abramsky, S., " Gabbay, D.M., " Maibaum, T.S.E. (eds.): Handbook of Logic in Computer Science. Volume I. Background: Mathematical Stuctures, pp. 641-761, Clarendon Press, Oxford, 1992.
    • (1992) Handbook of Logic in Computer Science , vol.1 , pp. 641-761
    • Smyth, M.B.1
  • 33
    • 0000815146 scopus 로고
    • Sur l'extension de l'ordre partiel
    • Szpilrajn, E., Sur l'extension de l'ordre partiel, Fund. Math. 16 (1930), pp. 386-389.
    • (1930) Fund. Math. , vol.16 , pp. 386-389
    • Szpilrajn, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.