메뉴 건너뛰기




Volumn , Issue , 2012, Pages 198-212

A framework for the cryptographic verification of java-like programs

Author keywords

[No Author keywords available]

Indexed keywords

ACTIVE ADVERSARY; AUTOMATIC PROGRAMS; CRYPTOGRAPHIC SECURITY; ENCRYPTED MESSAGES; INDISTINGUISHABILITY; JAVA PROGRAM; JAVA-LIKE PROGRAMS; NON INTERFERENCE; PROGRAM ANALYSIS; PROOF OF CONCEPT; SIMULATION-BASED SECURITY;

EID: 84866939599     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2012.9     Document Type: Conference Paper
Times cited : (34)

References (35)
  • 2
  • 4
    • 80455144511 scopus 로고    scopus 로고
    • The JavaSPI framework for security protocol implementation
    • IEEE Computer Society, IEEE Computer Society
    • Matteo Avalle, Alfredo Pironti, Riccardo Sisto, and Davide Pozza. The JavaSPI framework for security protocol implementation. In Availability, Reliability and Security (ARES 11), page 746-751. IEEE Computer Society, IEEE Computer Society, 2011.
    • (2011) Availability, Reliability and Security (ARES 11) , pp. 746-751
    • Avalle, M.1    Pironti, A.2    Sisto, R.3    Pozza, D.4
  • 9
    • 33751067991 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • IEEE Computer Society
    • B. Blanchet. A Computationally Sound Mechanized Prover for Security Protocols. In IEEE Symposium on Security and Privacy (S& P 2006), pages 140-154. IEEE Computer Society, 2006.
    • (2006) IEEE Symposium on Security and Privacy (S& P 2006) , pp. 140-154
    • Blanchet, B.1
  • 10
    • 28144462281 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • December
    • R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. Technical Report 2000/067, Cryptology ePrint Archive, December 2005. http: //eprint.iacr.org/2000/067.
    • (2005) Technical Report 2000/067, Cryptology EPrint Archive
    • Canetti, R.1
  • 12
    • 67650679552 scopus 로고    scopus 로고
    • Non-interference for deterministic interactive programs
    • Pierpaolo Degano, Joshua D. Guttman, and Fabio Martinelli, editors FAST 2008, Revised Selected Papers, Volume 5491 of Lecture Notes in Computer Science Springer
    • David Clark and Sebastian Hunt. Non-Interference for Deterministic Interactive Programs. In Pierpaolo Degano, Joshua D. Guttman, and Fabio Martinelli, editors, Formal Aspects in Security and Trust, 5th International Workshop, FAST 2008, Revised Selected Papers, volume 5491 of Lecture Notes in Computer Science, pages 50-66. Springer, 2008.
    • (2008) Formal Aspects in Security and Trust, 5th International Workshop , pp. 50-66
    • Clark, D.1    Hunt, S.2
  • 13
    • 80755135036 scopus 로고    scopus 로고
    • How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones
    • Thomas Schwentick and Christoph Dürr, editors Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik
    • Hubert Comon-Lundh and Véronique Cortier. How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones. In Thomas Schwentick and Christoph Dürr, editors, Proceedings of the 28th International Symposium on Theoretical Aspects of Computer Science (STACS 2011), volume 9 of LIPIcs, pages 29-44. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2011.
    • (2011) Proceedings of the 28th International Symposium on Theoretical Aspects of Computer Science (STACS 2011), Volume 9 of LIPIcs , pp. 29-44
    • Hubert, C.-L.1    Cortier, V.2
  • 19
    • 70350572805 scopus 로고    scopus 로고
    • Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs
    • December
    • Christian Hammer and Gregor Snelting. Flow-Sensitive, Context-Sensitive, and Object-sensitive Information Flow Control Based on Program Dependence Graphs. International Journal of Information Security, 8(6):399-422, December 2009.
    • (2009) International Journal of Information Security , vol.8 , Issue.6 , pp. 399-422
    • Hammer, C.1    Snelting, G.2
  • 22
    • 33747124759 scopus 로고    scopus 로고
    • A machine-checked model for a java-like language, virtual machine, and compiler
    • Gerwin Klein and Tobias Nipkow. A Machine-Checked Model for a Java-Like Language, Virtual Machine, and Compiler. ACM Trans. Program. Lang. Syst., 28(4):619-695, 2006.
    • (2006) ACM Trans. Program. Lang. Syst. , vol.28 , Issue.4 , pp. 619-695
    • Klein, G.1    Nipkow, T.2
  • 25
    • 51749119261 scopus 로고    scopus 로고
    • Joint state theorems for public-key encryption and digitial signature functionalities with local computation
    • IEEE Computer Society
    • Ralf Küsters and Max Tuengerthal. Joint State Theorems for Public-Key Encryption and Digitial Signature Functionalities with Local Computation. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008), pages 270-284. IEEE Computer Society, 2008.
    • (2008) Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008) , pp. 270-284
    • Küsters, R.1    Tuengerthal, M.2
  • 31
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • IEEE Computer Society Press
    • B. Pfitzmann and M. Waidner. A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. In IEEE Symposium on Security and Privacy, pages 184-201. IEEE Computer Society Press, 2001.
    • (2001) IEEE Symposium on Security and Privacy , pp. 184-201
    • Pfitzmann, B.1    Waidner, M.2
  • 34
    • 84866906942 scopus 로고    scopus 로고
    • Proving information flow noninterference by reusing a machine-checked correctness proof for slicing
    • July
    • Daniel Wasserrab and Denis Lohner. Proving Information Flow Noninterference by Reusing a Machine-Checked Correctness Proof for Slicing. In 6th International Verification Workshop - VERIFY-2010, July 2010.
    • (2010) 6th International Verification Workshop - VERIFY-2010
    • Wasserrab, D.1    Lohner, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.