메뉴 건너뛰기




Volumn 2021 LNCS, Issue , 2001, Pages 135-152

Secrecy-preserving refinement

Author keywords

[No Author keywords available]

Indexed keywords

SPECIFICATIONS; SOFTWARE ENGINEERING;

EID: 84881150179     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45251-6_8     Document Type: Conference Paper
Times cited : (39)

References (30)
  • 1
    • 0002652530 scopus 로고    scopus 로고
    • Security protocols and their properties
    • F. L. Bauer and R. Steinbrueggen, editors, IOS Press, 20th Int. Summer School, Marktoberdorf, Germany
    • M. Abadi. Security protocols and their properties. In F.L. Bauer and R. Steinbrueggen, editors, Foundations of Secure Computation, pages 39-60. IOS Press, 2000. 20th Int. Summer School, Marktoberdorf, Germany.
    • (2000) Foundations of Secure Computation , pp. 39-60
    • Abadi, M.1
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • January
    • M. Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, January 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 5
    • 84885216946 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (invited lecture)
    • Japan, August
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (invited lecture). In TCS 2000 (IFIP conference), Japan, August 2000.
    • (2000) TCS 2000 (IFIP Conference)
    • Abadi, M.1    Rogaway, P.2
  • 7
    • 2942751834 scopus 로고    scopus 로고
    • A logical basis for component-based systems engineering
    • M. Broy and R. Steinbruggen, editors, IOS Press
    • M. Broy. A logical basis for component-based systems engineering. In M. Broy and R. Steinbruggen, editors, Calculational System Design. IOS Press, 1999.
    • (1999) Calculational System Design
    • Broy, M.1
  • 11
    • 84895411666 scopus 로고
    • Formal and informal specifications of a secure system component: First results in a comparative study
    • M. Naftalin, B. T. Denvir, and M. Bertran, editors, Springer
    • S. Fitzgerald, T. M. Brookes, M. A. Green, and P. G. Larsen. Formal and informal specifications of a secure system component: first results in a comparative study. In M. Naftalin, B. T. Denvir, and M. Bertran, editors, FME'94: Industrial Benefit of Formal Methods, pages 35-44. Springer, 1994.
    • (1994) FME'94: Industrial Benefit of Formal Methods , pp. 35-44
    • Fitzgerald, S.1    Brookes, T.M.2    Green, M.A.3    Larsen, P.G.4
  • 16
    • 84944220091 scopus 로고    scopus 로고
    • Towards development of secure systems using UML
    • H. Hußmann, editor, Springer, to be published
    • Jan Jürjens. Towards development of secure systems using UML. In H. Hußmann, editor, Fundamental Approaches to Software Engineering, LNCS. Springer, 2001. to be published.
    • (2001) Fundamental Approaches to Software Engineering, LNCS
    • Jürjens, J.1
  • 20
    • 0003307796 scopus 로고
    • Security models
    • John Marciniak, editor, Wiley & Sons, Inc.
    • J. McLean. Security models. In John Marciniak, editor, Encyclopedia of Software Engineering. Wiley & Sons, Inc., 1994.
    • (1994) Encyclopedia of Software Engineering
    • McLean, J.1
  • 21
    • 0002426876 scopus 로고    scopus 로고
    • A general theory of composition for a class of possibilistic properties
    • J. McLean. A general theory of composition for a class of "possibilistic" properties. IEEE Transactions on Software Engineering, 22(1):53-67, 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 53-67
    • McLean, J.1
  • 22
    • 0026850058 scopus 로고
    • Using traces based on procedure calls to reason about com-posability
    • C. Meadows. Using traces based on procedure calls to reason about com-posability. In IEEE Symposium on Security and Privacy, pages 177 - 188, 1992.
    • (1992) IEEE Symposium on Security and Privacy , pp. 177-188
    • Meadows, C.1
  • 23
    • 0001566477 scopus 로고    scopus 로고
    • Formal verification of cryptographic protocols: A survey
    • C. Meadows. Formal verification of cryptographic protocols: A survey. In Asiacrypt 96, 1996.
    • (1996) Asiacrypt , vol.96
    • Meadows, C.1
  • 25
    • 0002219322 scopus 로고    scopus 로고
    • An attack on a recursive authentication protocol
    • P. Ryan and S. Schneider. An attack on a recursive authentication protocol. Inform. Proc. Letters, 65:7-10, 1998.
    • (1998) Inform Proc. Letters , vol.65 , pp. 7-10
    • Ryan, P.1    Schneider, S.2
  • 29
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • J. Saltzer and M. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 30
    • 0033719707 scopus 로고    scopus 로고
    • Secure composition of untrusted code: Wrappers and causality types
    • P. Sewell and J. Vitek. Secure composition of untrusted code: Wrappers and causality types. In CSFW, 2000.
    • (2000) CSFW
    • Sewell, P.1    Vitek, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.