메뉴 건너뛰기




Volumn , Issue , 1995, Pages 11-21

A state-based approach to noninterference

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY SYSTEMS;

EID: 84886601007     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.1994.315951     Document Type: Conference Paper
Times cited : (12)

References (28)
  • 1
    • 85031933412 scopus 로고
    • Technical Report 66 DEC Systems Research Center October
    • Martin Abadi and Leslie Lamport. Composing specifications. Technical Report 66, DEC Systems Research Center, October 1990.
    • (1990) Composing Specifications
    • Abadi, M.1    Lamport, L.2
  • 3
    • 84976675687 scopus 로고
    • Information transmission in computational systems
    • November
    • E. Cohen. Information transmission in computational systems. ACM SIGOPS Operating System Review, 11(5), November 1977.
    • (1977) ACM SIGOPS Operating System Review , vol.11 , Issue.5
    • Cohen, E.1
  • 11
    • 0018005391 scopus 로고
    • Communicating sequential processes
    • August
    • C.A.R. Hoare. Communicating sequential processes. Communications of the ACM, 21(8):666-677, August 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.8 , pp. 666-677
    • Hoare, C.A.R.1
  • 12
    • 0022614502 scopus 로고
    • Extending the noninterference version of MLS for SAT
    • IEEE Computer Society, April
    • J.T. Haigh and W.D. Young. Extending the noninterference version of MLS for SAT. In Proceedings of the Symposium on Security and Privacy, pages 232-239. IEEE Computer Society, April 1986.
    • (1986) Proceedings of the Symposium on Security and Privacy , pp. 232-239
    • Haigh, J.T.1    Young, W.D.2
  • 13
    • 0024663847 scopus 로고
    • On the derivation of secure components
    • IEEE Computer Society, May
    • Jeremy Jacob. On the derivation of secure components. In Proceedings of the Symposium on Security and Privacy, pages 243-247. IEEE Computer Society, May 1989.
    • (1989) Proceedings of the Symposium on Security and Privacy , pp. 243-247
    • Jacob, J.1
  • 18
    • 0025438880 scopus 로고
    • A hookup theorem for multilevel security
    • June
    • Daryl McCullough. A hookup theorem for multilevel security. IEEE Transactions on Software Engineering, 16(6):563-568, June 1990.
    • (1990) IEEE Transactions on Software Engineering , vol.16 , Issue.6 , pp. 563-568
    • McCullough, D.1
  • 25
    • 0018019384 scopus 로고
    • A model of verification of data security in operating systems
    • September
    • G. Popek and D. Farber. A model of verification of data security in operating systems. Communications of the ACM, 21(9), September 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.9
    • Popek, G.1    Farber, D.2
  • 26


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.