메뉴 건너뛰기




Volumn 7159 LNCS, Issue , 2012, Pages 46-59

Runtime enforcement of information flow security in tree manipulating processes

Author keywords

information flow control; runtime enforcement; Semi structured data

Indexed keywords

BUSINESS PROCESS; CONSTANT PROPAGATION; INFORMATION FLOW CONTROL; INFORMATION FLOW POLICIES; INFORMATION FLOW SECURITY; PROGRAMMING LANGUAGE; RUNTIME MONITORS; RUNTIMES; SEMI STRUCTURED DATA; SUBTREES; WORKFLOW LANGUAGE;

EID: 84857260231     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-28166-2_6     Document Type: Conference Paper
Times cited : (12)

References (33)
  • 3
    • 79959315082 scopus 로고    scopus 로고
    • Static information flow analysis of workflow models
    • GI Abramowicz, W., Alt, R., Fähnrich, K.P., Franczyk, B., Maciaszek, L.A. (eds.) ISSS/BPSC.
    • Accorsi, R., Wonnemann, C.: Static information flow analysis of workflow models. In: Abramowicz, W., Alt, R., Fähnrich, K.P., Franczyk, B., Maciaszek, L.A. (eds.) ISSS/BPSC. LNI, vol. 177, pp. 194-205. GI (2010)
    • (2010) LNI , vol.177 , pp. 194-205
    • Accorsi, R.1    Wonnemann, C.2
  • 6
    • 57049111067 scopus 로고    scopus 로고
    • Termination-Insensitive Noninterference Leaks more than Just a Bit
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
    • Askarov, A., Hunt, S., Sabelfeld, A., Sands, D.: Termination-Insensitive Noninterference Leaks more than Just a Bit. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 333-348. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 333-348
    • Askarov, A.1    Hunt, S.2    Sabelfeld, A.3    Sands, D.4
  • 9
    • 26944481746 scopus 로고    scopus 로고
    • Theoretical foundations for compensations in flow composition languages
    • Palsberg, J., Abadi, M. (eds.) ACM
    • Bruni, R., Melgratti, H.C., Montanari, U.: Theoretical foundations for compensations in flow composition languages. In: Palsberg, J., Abadi, M. (eds.) POPL, pp. 209-220. ACM (2005)
    • (2005) POPL , pp. 209-220
    • Bruni, R.1    Melgratti, H.C.2    Montanari, U.3
  • 11
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236-243 (1976)
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 12
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504-513 (1977)
    • (1977) Commun. ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 13
    • 35048820041 scopus 로고    scopus 로고
    • Automaton-based confidentiality monitoring of concurrent programs
    • IEEE Computer Society
    • Guernic, G.L.: Automaton-based confidentiality monitoring of concurrent programs. In: CSF, pp. 218-232. IEEE Computer Society (2007)
    • (2007) CSF , pp. 218-232
    • Guernic, G.L.1
  • 14
    • 77049098553 scopus 로고    scopus 로고
    • Sock: A Calculus for Service Oriented Computing
    • Dan, A., Lamersdorf, W. (eds.) ICSOC 2006. Springer, Heidelberg
    • Guidi, C., Lucchi, R., Gorrieri, R., Busi, N., Zavattaro, G.: Sock: A Calculus for Service Oriented Computing. In: Dan, A., Lamersdorf, W. (eds.) ICSOC 2006. LNCS, vol. 4294, pp. 327-338. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4294 , pp. 327-338
    • Guidi, C.1    Lucchi, R.2    Gorrieri, R.3    Busi, N.4    Zavattaro, G.5
  • 15
    • 70350572805 scopus 로고    scopus 로고
    • Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs
    • Hammer, C., Snelting, G.: Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. International Journal of Information Security 8(6), 399-422 (2009)
    • (2009) International Journal of Information Security , vol.8 , Issue.6 , pp. 399-422
    • Hammer, C.1    Snelting, G.2
  • 16
    • 27144536920 scopus 로고    scopus 로고
    • Transforming BPEL to Petri Nets
    • van der Aalst, W.M.P., Benatallah, B., Casati, F., Curbera, F. (eds.) BPM 2005. Springer, Heidelberg
    • Hinz, S., Schmidt, K., Stahl, C.: Transforming BPEL to Petri Nets. In: van der Aalst, W.M.P., Benatallah, B., Casati, F., Curbera, F. (eds.) BPM 2005. LNCS, vol. 3649, pp. 220-235. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3649 , pp. 220-235
    • Hinz, S.1    Schmidt, K.2    Stahl, C.3
  • 18
    • 33947654823 scopus 로고    scopus 로고
    • Transformational typing and unification for automatically correcting insecure programs
    • Köpf, B., Mantel, H.: Transformational typing and unification for automatically correcting insecure programs. Int. J. Inf. Sec. 6(2-3), 107-131 (2007)
    • (2007) Int. J. Inf. Sec. , vol.6 , Issue.2-3 , pp. 107-131
    • Köpf, B.1    Mantel, H.2
  • 20
    • 33750457295 scopus 로고    scopus 로고
    • A pi-calculus based semantics for WS-BPEL
    • Lucchi, R., Mazzara, M.: A pi-calculus based semantics for WS-BPEL. J. Log. Algebr. Program. 70(1), 96-118 (2007)
    • (2007) J. Log. Algebr. Program , vol.70 , Issue.1 , pp. 96-118
    • Lucchi, R.1    Mazzara, M.2
  • 26
    • 70350355123 scopus 로고    scopus 로고
    • Tracking Information Flow in Dynamic Tree Structures
    • Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
    • Russo, A., Sabelfeld, A., Chudnov, A.: Tracking Information Flow in Dynamic Tree Structures. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 86-103. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 86-103
    • Russo, A.1    Sabelfeld, A.2    Chudnov, A.3
  • 28
    • 77951106085 scopus 로고    scopus 로고
    • From Dynamic to Static and Back: Riding the Roller Coaster of Information-flow Control Research
    • Pnueli, A., Virbitskaite, I., Voronkov, A. (eds.) PSI 2009. Springer, Heidelberg
    • Sabelfeld, A., Russo, A.: From Dynamic to Static and Back: Riding the Roller Coaster of Information-flow Control Research. In: Pnueli, A., Virbitskaite, I., Voronkov, A. (eds.) PSI 2009. LNCS, vol. 5947, pp. 352-365. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5947 , pp. 352-365
    • Sabelfeld, A.1    Russo, A.2
  • 30
    • 85008603199 scopus 로고    scopus 로고
    • Provably Correct Runtime Enforcement of Non-Interference Properties
    • Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. Springer, Heidelberg
    • Venkatakrishnan, V.N., Xu, W., DuVarney, D.C., Sekar, R.: Provably Correct Runtime Enforcement of Non-Interference Properties. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 332-351. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4307 , pp. 332-351
    • Venkatakrishnan, V.N.1    Xu, W.2    DuVarney, D.C.3    Sekar, R.4
  • 32
    • 33750538195 scopus 로고    scopus 로고
    • Semantic-Based Development of Service-Oriented Systems
    • Najm, E., Pradat-Peyre, J.-F., Donzeau-Gouge, V.V. (eds.) FORTE 2006. Springer, Heidelberg
    • Wirsing, M., Clark, A., Gilmore, S., Hölzl, M., Knapp, A., Koch, N., Schroeder, A.: Semantic-Based Development of Service-Oriented Systems. In: Najm, E., Pradat-Peyre, J.-F., Donzeau-Gouge, V.V. (eds.) FORTE 2006. LNCS, vol. 4229, pp. 24-45. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4229 , pp. 24-45
    • Wirsing, M.1    Clark, A.2    Gilmore, S.3    Hölzl, M.4    Knapp, A.5    Koch, N.6    Schroeder, A.7
  • 33
    • 70350635706 scopus 로고    scopus 로고
    • Verification of Business Process Entailment Constraints using SPIN
    • Massacci, F., Redwine Jr., S.T., Zannone, N. (eds.) ESSoS 2009. Springer, Heidelberg
    • Wolter, C., Miseldine, P., Meinel, C.: Verification of Business Process Entailment Constraints using SPIN. In: Massacci, F., Redwine Jr., S.T., Zannone, N. (eds.) ESSoS 2009. LNCS, vol. 5429, pp. 1-15. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5429 , pp. 1-15
    • Wolter, C.1    Miseldine, P.2    Meinel, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.