메뉴 건너뛰기




Volumn 40, Issue 1, 2012, Pages 88-115

Synthesis of opaque systems with static and dynamic masks

Author keywords

Confidentiality property; Dynamic observation; Opacity; Security; Synthesis

Indexed keywords

CONFIDENTIALITY PROPERTY; DYNAMIC MASKS; DYNAMIC OBSERVATION; LOWER BOUNDS; PARTIAL OBSERVABILITY; SECRET INFORMATION; SECURITY; SECURITY PROPERTIES; STATIC AND DYNAMIC; SYNTHESIS PROBLEMS;

EID: 84857190463     PISSN: 09259856     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10703-012-0141-9     Document Type: Article
Times cited : (143)

References (27)
  • 3
    • 26844508455 scopus 로고    scopus 로고
    • Automated verification of selected equivalences for security protocols
    • Proceedings - 20th Annual IEEE symposium on Logic in Computer Science, LICS 2005
    • Blanchet B, Abadi M, Fournet C (2005) Automated verification of selected equivalences for security protocols. In: 20th IEEE symposium on logic in computer science (LICS 2005), Chicago, IL, June 2005. IEEE Computer Society, Los Alamitos, pp 331-340 (Pubitemid 41462579)
    • (2005) Proceedings - Symposium on Logic in Computer Science , pp. 331-340
    • Blanchet, B.1    Abadi, M.2    Fournet, C.3
  • 5
    • 53149128468 scopus 로고    scopus 로고
    • Fault diagnosis with static or dynamic diagnosers
    • Cassez F, Tripakis S (2008) Fault diagnosis with static or dynamic diagnosers. Fundam Inform 88(4):497-540
    • (2008) Fundam Inform , vol.88 , Issue.4 , pp. 497-540
    • Cassez, F.1    Tripakis, S.2
  • 9
    • 0032642997 scopus 로고    scopus 로고
    • Efficient algorithms for optimum cycle mean and optimum cost to time ratio problems
    • New Orleans, Louisiana, United States. ACM, New York
    • Dasdan A, Irani S, Gupta R (1999) Efficient algorithms for optimum cycle mean and optimum cost to time ratio problems. In: Annual ACM IEEE design automation conference, New Orleans, Louisiana, United States. ACM, New York, pp 37-42
    • (1999) Annual ACM IEEE Design Automation Conference , pp. 37-42
    • Dasdan, A.1    Irani, S.2    Gupta, R.3
  • 11
    • 84955199515 scopus 로고    scopus 로고
    • Monitoring confidentiality by diagnosis techniques
    • Budapest, Hungary, August 2009
    • Dubreil J, Jéron T, Marchand H (2009) Monitoring confidentiality by diagnosis techniques. In: European control conference, Budapest, Hungary, August 2009, pp 2584-2590
    • (2009) European Control Conference , pp. 2584-2590
    • Dubreil, J.1    Jéron, T.2    Marchand, H.3
  • 14
    • 84988393004 scopus 로고    scopus 로고
    • Classification of Security Properties (Part I: Information Flow)
    • Foundations of Security Analysis and Design
    • Focardi R, Gorrieri R (2001) Classification of security properties (part I: Information flow). In: Focardi R, Gorrieri R (eds) Foundations of security analysis and design I: FOSAD 2000 tutorial lectures. Lecture notes in computer science, vol 2171. Springer, Heidelberg, pp 331-396 (Pubitemid 33364383)
    • (2001) Lecture Notes in Computer Science , Issue.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 16
    • 0001391363 scopus 로고
    • A characterization of the minimum mean cycle in a digraph
    • Karp R (1978) A characterization of the minimum mean cycle in a digraph. Discrete Math 23:309-311
    • (1978) Discrete Math , vol.23 , pp. 309-311
    • Karp, R.1
  • 17
    • 38349070556 scopus 로고    scopus 로고
    • Information flow testing - The third path towards confidentiality guarantee
    • ASIAN 2007, Computer and network security. LNCS
    • Le Guernic G (2007) Information flow testing - the third path towards confidentiality guarantee. In: Advances in computer science, ASIAN 2007, Computer and network security. LNCS, vol 4846, pp 33-47
    • (2007) Advances in Computer Science , vol.4846 , pp. 33-47
    • Le Guernic, G.1
  • 18
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • DOI 10.1007/s10207-004-0046-8
    • Ligatti J, Bauer L, Walker D (2005) Edit automata: enforcement mechanisms for run-time security policies. Int J Inf Secur 4(1-2):2-16 (Pubitemid 40347198)
    • (2005) International Journal of Information Security , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 19
    • 0033353968 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • Lowe G (1999) Towards a completeness result for model checking of security protocols. J Comput Secur 7(2-3):89-146 (Pubitemid 30524009)
    • (1999) Journal of Computer Security , vol.7 , Issue.2 , pp. 89-146
    • Lowe Gavin1
  • 20
    • 0001434559 scopus 로고
    • Borel determinacy
    • Martin D (1975) Borel determinacy. Ann Math 102(2):363-371
    • (1975) Ann Math , vol.102 , Issue.2 , pp. 363-371
    • Martin, D.1
  • 22
    • 34250741060 scopus 로고    scopus 로고
    • A question of access: Decentralized control and communication strategies for security policies
    • DOI 10.1109/WODES.2006.1678408, 1678408, Proceedings - Eighth International Workshop on Discrete Event Systems, WODES 2006
    • Ricker SL (2006) A question of access: decentralized control and communication strategies for security policies. In: 8th international workshop on discrete event systems, June 2006, pp 58-63 (Pubitemid 46949241)
    • (2006) Proceedings - Eighth International Workshop on Discrete Event Systems, WODES 2006 , pp. 58-63
    • Ricker, S.L.1
  • 23
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • Schneider F (2000) Enforceable security policies. ACM Trans Inf Syst Secur 3(1):30-50
    • (2000) ACM Trans Inf Syst Secur , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.1
  • 24
    • 0015773009 scopus 로고
    • Word problems requiring exponential time: Preliminary report
    • ACM, New York
    • Stockmeyer L, Meyer A (1973) Word problems requiring exponential time: Preliminary report. In: STOC. ACM, New York, pp 1-9
    • (1973) STOC , pp. 1-9
    • Stockmeyer, L.1    Meyer, A.2
  • 25
    • 70449682552 scopus 로고    scopus 로고
    • A formula for the supremal controllable and opaque sublanguage arising in supervisory control
    • Takai S, Oka Y (2008) A formula for the supremal controllable and opaque sublanguage arising in supervisory control. J Control Meas Syst Integr 1(4):307-312
    • (2008) J Control Meas Syst Integr , vol.1 , Issue.4 , pp. 307-312
    • Takai, S.1    Oka, Y.2
  • 27
    • 0030143640 scopus 로고    scopus 로고
    • The complexity of mean payoff games on graphs
    • Zwick U, Paterson M (1996) The complexity of mean payoff games on graphs. Theor Comput Sci 158(1-2):343-359 (Pubitemid 126411935)
    • (1996) Theoretical Computer Science , vol.158 , Issue.1-2 , pp. 343-359
    • Zwick, U.1    Paterson, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.