메뉴 건너뛰기




Volumn , Issue , 2012, Pages 293-307

Securing interactive programs

Author keywords

[No Author keywords available]

Indexed keywords

COMPOSITIONALITY; INFORMATION FLOWS; INTERACTIVE PROGRAMS; MODELING ENVIRONMENTS; PARALLEL COMPOSITION; SCOPING; SECURITY LEVEL; SECURITY TYPES; THREAD POOLS; TWO-DIMENSION; TYPE SYSTEMS;

EID: 84866905933     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2012.15     Document Type: Conference Paper
Times cited : (21)

References (33)
  • 6
    • 0037014243 scopus 로고    scopus 로고
    • Non-interference for concurrent programs and thread systems
    • June
    • G. Boudol and I. Castellani. Non-interference for concurrent programs and thread systems. Theoretical Computer Science, 281(1):109-130, June 2002.
    • (2002) Theoretical Computer Science , vol.281 , Issue.1 , pp. 109-130
    • Boudol, G.1    Castellani, I.2
  • 8
    • 19544375598 scopus 로고    scopus 로고
    • Enforcing security and safety models with an information flow analysis tool
    • R. Chapman and A. Hilton. Enforcing security and safety models with an information flow analysis tool. ACM SIGAda Ada Letters, 24(4):39-46, 2004.
    • (2004) ACM SIGAda Ada Letters , vol.24 , Issue.4 , pp. 39-46
    • Chapman, R.1    Hilton, A.2
  • 10
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 12
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • R. Focardi and R. Gorrieri. A classification of security properties for process algebras. J. Computer Security, 3(1):5-33, 1995.
    • (1995) J. Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 18
    • 0033701251 scopus 로고    scopus 로고
    • Possibilistic definitions of security - An assembly kit
    • July
    • H. Mantel. Possibilistic definitions of security - An assembly kit -. In Proc. IEEE Computer Security Foundations Workshop, pages 185-199, July 2000.
    • (2000) Proc. IEEE Computer Security Foundations Workshop , pp. 185-199
    • Mantel, H.1
  • 19
    • 84881123660 scopus 로고    scopus 로고
    • Information flow control and applications- bridging a gap
    • Springer-Verlag, March
    • H. Mantel. Information flow control and applications- Bridging a gap. In Proc. Formal Methods Europe, volume 2021 of LNCS, pages 153-172. Springer-Verlag, March 2001.
    • (2001) Proc. Formal Methods Europe, Volume 2021 of LNCS , pp. 153-172
    • Mantel, H.1
  • 20
    • 0023231848 scopus 로고
    • Specifications for multi-level security and hook-up property
    • April
    • D. McCullough. Specifications for multi-level security and hook-up property. In Proc. IEEE Symp. on Security and Privacy, pages 161-166, April 1987.
    • (1987) Proc. IEEE Symp. on Security and Privacy , pp. 161-166
    • McCullough, D.1
  • 21
    • 0141528662 scopus 로고    scopus 로고
    • A unifying approach to the security of distributed and multi-threaded programs
    • September
    • H. Mantel and A. Sabelfeld. A unifying approach to the security of distributed and multi-threaded programs. J. Computer Security, 11(4):615-676, September 2003.
    • (2003) J. Computer Security , vol.11 , Issue.4 , pp. 615-676
    • Mantel, H.1    Sabelfeld, A.2
  • 25
    • 84948737028 scopus 로고    scopus 로고
    • A simple view of type-secure information flow in the pi-calculus
    • June
    • F. Pottier. A simple view of type-secure information flow in the pi-calculus. In Proc. IEEE Computer Security Foundations Workshop, pages 320-330, June 2002.
    • (2002) Proc. IEEE Computer Security Foundations Workshop , pp. 320-330
    • Pottier, F.1
  • 28
    • 0012886288 scopus 로고    scopus 로고
    • Mathematical models of computer security-tutorial lectures
    • R. Focardi and R. Gorrieri, editors Springer-Verlag
    • P. Ryan. Mathematical models of computer security-tutorial lectures. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 1-62. Springer-Verlag, 2001.
    • (2001) Foundations of Security Analysis and Design, Volume 2171 of LNCS , pp. 1-62
    • Ryan, P.1
  • 29
    • 33646091639 scopus 로고    scopus 로고
    • Software release. Located July
    • V. Simonet. The Flow Caml system. Software release. Located at http://cristal.inria.fr/~simonet/soft/flowcaml, July 2003.
    • (2003) The Flow Caml System
    • Simonet, V.1
  • 30
    • 84958755151 scopus 로고    scopus 로고
    • Static confidentiality enforcement for distributed programs
    • Springer-Verlag, September
    • A. Sabelfeld and H. Mantel. Static confidentiality enforcement for distributed programs. In Proc. Symp. on Static Analysis, volume 2477 of LNCS, pages 376-394. Springer-Verlag, September 2002.
    • (2002) Proc. Symp. on Static Analysis, Volume 2477 of LNCS , pp. 376-394
    • Sabelfeld, A.1    Mantel, H.2
  • 32
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3):167-187, 1996.
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.