메뉴 건너뛰기




Volumn 6858 LNCS, Issue , 2011, Pages 125-151

On intransitive non-interference in some models of concurrency

Author keywords

[No Author keywords available]

Indexed keywords

BISIMULATION EQUIVALENCES; DETERMINISTIC AUTOMATA; ELEMENTARY NET SYSTEM; INTRANSITIVE NON-INTERFERENCE; LABELLED TRANSITION SYSTEMS; NET STRUCTURES; NONDETERMINISTIC AUTOMATA; SECRET INFORMATION;

EID: 84857723938     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-23082-0_5     Document Type: Article
Times cited : (20)

References (25)
  • 1
    • 84859323837 scopus 로고    scopus 로고
    • On the decidability of non interference over unbounded petri nets
    • Procs. SecCo 2010
    • Best, E., Darondeau, P., Gorrieri, R.: On the Decidability of Non Interference over Unbounded Petri Nets. EPTCS 51, 16-33 (2010); Procs. SecCo 2010
    • (2010) EPTCS , vol.51 , Issue.16-33
    • Best, E.1    Darondeau, P.2    Gorrieri, R.3
  • 3
    • 33747039373 scopus 로고    scopus 로고
    • Positive non-interference in elementary and trace nets
    • In: Cortadella, J., Reisig, W. (eds.) Springer, Heidelberg
    • Busi, N., Gorrieri, R.: Positive Non-Interference in Elementary and Trace Nets. In: Cortadella, J., Reisig, W. (eds.) ICATPN 2004. LNCS, vol. 3099, pp. 1-16. Springer, Heidelberg (2004)
    • (2004) ICATPN 2004. LNCS , vol.3099 , pp. 1-16
    • Busi, N.1    Gorrieri, R.2
  • 4
    • 74049123448 scopus 로고    scopus 로고
    • Structural non-interference in elementary and trace nets
    • Busi, N., Gorrieri, R.: Structural Non-Interference in Elementary and Trace Nets. Mathematical Structures in Computer Science 19(6), 1065-1090 (2009)
    • (2009) Mathematical Structures in Computer Science , vol.19 , Issue.6 , pp. 1065-1090
    • Busi, N.1    Gorrieri, R.2
  • 6
    • 0037751119 scopus 로고    scopus 로고
    • Elementary net systems
    • In: Reisig, W., Rozenberg, G. (eds.) Springer, Heidelberg
    • Engelfriet, J., Rozenberg, G.: Elementary Net Systems. In: Reisig, W., Rozenberg, G. (eds.) APN 1998. LNCS, vol. 1491, pp. 12-121. Springer, Heidelberg (1998)
    • (1998) APN 1998. LNCS , vol.1491 , pp. 12-121
    • Engelfriet, J.1    Rozenberg, G.2
  • 8
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • Focardi, R., Gorrieri, R.: The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Transactions on Software Engineering 23(9), 550-571 (1997) (Pubitemid 127828315)
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 9
    • 84988393004 scopus 로고    scopus 로고
    • Classification of Security Properties (Part I: Information Flow)
    • Foundations of Security Analysis and Design
    • Focardi, R., Gorrieri, R.: Classification of Security Properties (Part I: Information Flow). In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 331-396. Springer, Heidelberg (2001) (Pubitemid 33364383)
    • (2001) Lecture Notes in Computer Science , Issue.2171 , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 10
    • 67650649695 scopus 로고    scopus 로고
    • Structural noninterference at work: The petri net security checker
    • In: Degano, P., Guttman, J., Martinelli, F. (eds.) Springer, Heidelberg
    • Frau, S., Gorrieri, R., Ferigato, C.: Structural Noninterference at Work: The Petri Net Security Checker. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 210-225. Springer, Heidelberg (2009)
    • (2009) FAST 2008. LNCS , vol.5491 , pp. 210-225
    • Frau, S.1    Gorrieri, R.2    Ferigato, C.3
  • 16
    • 0041386390 scopus 로고    scopus 로고
    • Bisimulation-based nondeterministic admissible interference and ita applications to the analysis of cryptographic protocols
    • Preliminary version in Electronic Notes in Theoretical Computer Science 61, 1-24 (2002)
    • Lafrance, S., Mullins, J.: Bisimulation-based Nondeterministic Admissible Interference and ita Applications to the Analysis of Cryptographic Protocols. Information and Software Technology 45(11), 779-790 (2003); Preliminary version in Electronic Notes in Theoretical Computer Science 61, 1-24 (2002)
    • (2003) Information and Software Technology , vol.45 , Issue.11 , pp. 779-790
    • Lafrance, S.1    Mullins, J.2
  • 17
    • 38049082649 scopus 로고    scopus 로고
    • What, indeed, is intransitive noninterference?
    • In: Biskup, J., López, J. (eds.), Springer, Heidelberg
    • van der Meyden, R.: What, Indeed, Is Intransitive Noninterference? In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 235-250. Springer, Heidelberg (2007)
    • (2007) ESORICS 2007. LNCS , vol.4734 , pp. 235-250
    • Van Der Meyden, R.1
  • 19
    • 0042361083 scopus 로고    scopus 로고
    • Nondeterministic admissible interference
    • Mullins, J.: Nondeterministic Admissible Interference. Journal of Universal Computer Science 11, 1054-1070 (2000)
    • (2000) Journal of Universal Computer Science , vol.11 , pp. 1054-1070
    • Mullins, J.1
  • 20
    • 0029228214 scopus 로고
    • Absorbing covers and intransitive noninterference
    • IEEE CS press, Los Alamitos
    • Pinsky, S.: Absorbing Covers and Intransitive Noninterference. In: Proc. of IEEE Symposium on Security and Privacy (SSP 1995), pp. 102-113. IEEE CS press, Los Alamitos (1995)
    • (1995) Proc. of IEEE Symposium on Security and Privacy (SSP 1995 , pp. 102-113
    • Pinsky, S.1
  • 24
    • 84949243805 scopus 로고    scopus 로고
    • Mathematical Models of Computer Security
    • Foundations of Security Analysis and Design
    • Ryan, P.Y.A.: Mathematical Models of Computer Security. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 1-62. Springer, Heidelberg (2001) (Pubitemid 33364378)
    • (2001) Lecture Notes in Computer Science , Issue.2171 , pp. 1-62
    • Ryan, P.Y.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.