메뉴 건너뛰기




Volumn 2076 LNCS, Issue , 2001, Pages 382-395

Noninterference for concurrent programs

Author keywords

[No Author keywords available]

Indexed keywords

SEMANTICS; AUTOMATA THEORY;

EID: 84879520825     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48224-5_32     Document Type: Conference Paper
Times cited : (37)

References (15)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 3
    • 84974597207 scopus 로고    scopus 로고
    • Non interference for the analysis of cryptographic protocols
    • LNCS
    • R. Focardi, R. Gorrieri, and F. Martinelli. Non interference for the analysis of cryptographic protocols. In Proceedings ICALP'00, number 1853 in LNCS, 2000.
    • (2000) Proceedings ICALP'00 , Issue.1853
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 6
    • 0000918759 scopus 로고    scopus 로고
    • Information flow vs resource access in the asynchronous pi-calculus (extended abstract)
    • LNCS
    • M. Hennessy and J. Riely. Information flow vs resource access in the asynchronous pi-calculus (extended abstract). In Proceedings ICALP'00, number 1853 in LNCS, 2000.
    • (2000) Proceedings ICALP'00 , Issue.1853
    • Hennessy, M.1    Riely, J.2
  • 12
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • ACM ACM Press
    • G. Smith and D. Volpano. Secure information flow in a multi-threaded imperative language. In ACM, editor, Proceedings POPL '98, pages 355-364. ACM Press, 1998.
    • (1998) Proceedings POPL '98 , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 14
    • 0033330060 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language
    • D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. Journal of Computer Security, 7(2-3), 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3
    • Volpano, D.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.