메뉴 건너뛰기




Volumn P-81, Issue , 2006, Pages 56-65

Safety, Liveness, and Information Flow: Dependability Revisited

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; FAULT TOLERANT COMPUTER SYSTEMS; SPECIFICATIONS;

EID: 79551552320     PISSN: 16175468     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (29)
  • 5
    • 0022144867 scopus 로고
    • Complexity of Network Synchronization
    • Oct
    • Baruch Awerbuch. Complexity of Network Synchronization. J. ACM, 32(4):804-823, Oct. 1985.
    • (1985) J. ACM , vol.32 , Issue.4 , pp. 804-823
    • Awerbuch, Baruch1
  • 7
    • 0023861309 scopus 로고
    • The Dining Cryptographers Problem: Unconditional sender and recipient untraceability
    • David Chaum. The Dining Cryptographers Problem: Unconditional sender and recipient untraceability. J. Cryptology, 1(1):65-75, 1988.
    • (1988) J. Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, David1
  • 8
    • 33845255668 scopus 로고    scopus 로고
    • Sicherheit in der Tnformationstechnik-der Begriff IT-Sicherheit
    • Aug
    • Rudiger Dierstein. Sicherheit in der Tnformationstechnik-der Begriff IT-Sicherheit. Informatik Spektrum, 27(4):343-353, Aug. 2004.
    • (2004) Informatik Spektrum , vol.27 , Issue.4 , pp. 343-353
    • Dierstein, Rudiger1
  • 10
    • 84947223138 scopus 로고    scopus 로고
    • Failure detection sequencers: Necessary and sufficient information about failures to solve predicate detection
    • und, Toulouse, France, Oct
    • Felix C. Gartner und Stefan Pleisch. Failure detection sequencers: Necessary and sufficient information about failures to solve predicate detection. In Proc. 16th Int. Symp. on Distr. Comp. (DISC 2002丿,number 2508 in LNCS, pages 280-294, Toulouse, France, Oct. 2002.
    • (2002) Proc. 16th Int. Symp. on Distr. Comp. (DISC 2002丿,number 2508 in LNCS , pp. 280-294
    • Gartner, Felix C.1    Pleisch, Stefan2
  • 12
    • 0017472779 scopus 로고
    • Proving the correctness of multiprocess programs
    • Mar
    • Leslie Lamport. Proving the correctness of multiprocess programs. IEEE Trans. Softw. Eng., 3(2):125-143, Mar. 1977.
    • (1977) IEEE Trans. Softw. Eng , vol.3 , Issue.2 , pp. 125-143
    • Lamport, Leslie1
  • 14
  • 18
    • 0033701251 scopus 로고    scopus 로고
    • Possibilistic Definitions of Security - An Assembly Kit
    • Cambridge, England, Juli
    • Heiko Mantel. Possibilistic Definitions of Security - An Assembly Kit. In Proc. 13th Comp. Sec. Found. Workshop (CSFW2000), Cambridge, England, Juli 2000.
    • (2000) Proc. 13th Comp. Sec. Found. Workshop (CSFW2000)
    • Mantel, Heiko1
  • 22
    • 0002426876 scopus 로고    scopus 로고
    • A General Theory of Composition for a Class of "Possibilistic” Properties
    • Jan
    • John McLean. A General Theory of Composition for a Class of "Possibilistic” Properties. IEEE Trans. Softw. Eng., 22(1):53-67, Jan. 1996.
    • (1996) IEEE Trans. Softw. Eng , vol.22 , Issue.1 , pp. 53-67
    • McLean, John1
  • 24
    • 0034823079 scopus 로고    scopus 로고
    • A Generic Approach to the Security of Multithreaded Programs
    • und, Cape Breton, Nova Scotia, Canada, Jun
    • Heiko Mantel und Andrei Sabelfeld. A Generic Approach to the Security of Multithreaded Programs. In Proc. 14th Comp. Sec. Found. Workshop (CSFW 2001), pages 126-142, Cape Breton, Nova Scotia, Canada, Jun. 2001.
    • (2001) Proc. 14th Comp. Sec. Found. Workshop (CSFW 2001) , pp. 126-142
    • Mantel, Heiko1    Sabelfeld, Andrei2
  • 26
    • 49149133038 scopus 로고
    • The temporal semantics of concurrent programs
    • Amir Pnueli. The temporal semantics of concurrent programs. Theoretical Computer Science, 13:45-60, 1981.
    • (1981) Theoretical Computer Science , vol.13 , pp. 45-60
    • Pnueli, Amir1
  • 28
    • 84898442665 scopus 로고
    • Kritik des Sicherheitsbegriffs im IT-Sicherheitsrahmenkonzept
    • Oct
    • Dirk Stelzer. Kritik des Sicherheitsbegriffs im IT-Sicherheitsrahmenkonzept. Datenschutz undDatensicherheit, 14(10):501-506, Oct. 1990.
    • (1990) Datenschutz undDatensicherheit , vol.14 , Issue.10 , pp. 501-506
    • Stelzer, Dirk1
  • 29
    • 0020762394 scopus 로고
    • Security Mechanisms in High-Level Network Protocols
    • und, Jun
    • Victor L. Voydock und Stephen T. Kent. Security Mechanisms in High-Level Network Protocols. ACM Comp. Surveys, 15(2):135-171, Jun. 1983.
    • (1983) ACM Comp. Surveys , vol.15 , Issue.2 , pp. 135-171
    • Voydock, Victor L.1    Kent, Stephen T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.