메뉴 건너뛰기




Volumn , Issue , 2011, Pages 73-82

Automating information flow control in component-based distributed systems

Author keywords

component based distributed system; information flow control; secure system configuration and deployment

Indexed keywords

COMPONENT BASED; DISTRIBUTED SYSTEMS; INFORMATION FLOW CONTROL; INFORMATION FLOWS; PERFORMANCE EVALUATION; POLICY CONFIGURATIONS; SECURE SYSTEM CONFIGURATION AND DEPLOYMENT; SECURITY CODES; SECURITY LEAK; SECURITY PROPERTIES; SYSTEM SECURITY;

EID: 79960535780     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2000229.2000241     Document Type: Conference Paper
Times cited : (14)

References (32)
  • 1
    • 79960516658 scopus 로고    scopus 로고
    • Object security site, 2001. http://www.objectsecurity.com.
    • (2001)
  • 2
    • 79960526941 scopus 로고    scopus 로고
    • web site
    • Jif web site, 2002. http://www.cs.cornell.edu/jif/.
    • (2002) Jif
  • 5
    • 79960529956 scopus 로고    scopus 로고
    • Enhancing IT Security with Trusted Computing Group, November
    • Enhancing IT Security with Trusted Computing Group, November 2006. Dell Power Solutions.
    • (2006) Dell Power Solutions
  • 6
    • 79960546206 scopus 로고    scopus 로고
    • web site
    • OSOA web site, 2007. http://www.osoa.org/.
    • (2007)
  • 8
    • 33746364838 scopus 로고    scopus 로고
    • Cryptographically sound implementations for communicating processes
    • Springer
    • P. Adão and C. Fournet. Cryptographically sound implementations for communicating processes. In ICALP (2), pages 83-94. Springer, 2006.
    • (2006) ICALP , Issue.2 , pp. 83-94
    • Adão, P.1    Fournet, C.2
  • 9
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From uml models to access control infrastructures
    • D. Basin, J. Doser, and T. Lodderstedt. Model driven security: From uml models to access control infrastructures. ACM Trans. Softw. Eng. Methodol., 15(1):39-91, 2006.
    • (2006) ACM Trans. Softw. Eng. Methodol. , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 16
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Commun. ACM, 20(7):504-513, 1977.
    • (1977) Commun. ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 20
    • 84865659111 scopus 로고    scopus 로고
    • Cryptographically sound implementations for typed information-flow security
    • ACM
    • C. Fournet and T. Rezk. Cryptographically sound implementations for typed information-flow security. In POPL, pages 323-335. ACM, 2008.
    • (2008) POPL , pp. 323-335
    • Fournet, C.1    Rezk, T.2
  • 22
    • 0031701347 scopus 로고    scopus 로고
    • The slam calculus: Programming with secrecy and integrity
    • N. Heintze and J. G. Riecke. The slam calculus: Programming with secrecy and integrity. In POPL, pages 365-377, 1998.
    • (1998) POPL , pp. 365-377
    • Heintze, N.1    Riecke, J.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.