메뉴 건너뛰기




Volumn 81, Issue , 2002, Pages 197-212

Control flow analysis of mobile ambients with security boundaries

Author keywords

Mobile ambients; Security; Static analysis

Indexed keywords

CALCULATIONS; FORMAL METHODS; STATIC ANALYSIS; SYNTACTICS;

EID: 84891342409     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-35496-5_14     Document Type: Article
Times cited : (18)

References (11)
  • 5
    • 84957807650 scopus 로고    scopus 로고
    • Safe Ambients: Control Flow Analysis and Security
    • LNCS
    • Degano, P., Levi, F. and Bodei, C. (2000). Safe Ambients: Control Flow Analysis and Security. In proceedings of ASIAN'00, LNCS 1961, 2000, pages 199-214.
    • (2000) Proceedings of ASIAN'00 , vol.1961 , Issue.2000 , pp. 199-214
    • Degano, P.1    Levi, F.2    Bodei, C.3
  • 6
    • 84974776068 scopus 로고
    • A Classification of Security Properties for Process Algebras
    • Focardi, R. and Gorrieri, R. (1995). A Classification of Security Properties for Process Algebras, Journal of Computer Security, 3(1): 5-33.
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 7
    • 0001439194 scopus 로고    scopus 로고
    • The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
    • Focardi, R. and Gorrieri, R. (1997). The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties, IEEE Transactions on Software Engineering, Vol. 23, No. 9.
    • (1997) IEEE Transactions On Software Engineering , vol.23 , Issue.9
    • Focardi, R.1    Gorrieri, R.2
  • 10
    • 0000918759 scopus 로고    scopus 로고
    • Information Flow vs. Resource Access in the Asynchronous Pi-Calculus
    • Hennessy, M. and Riely, J. (2000). Information Flow vs. Resource Access in the Asynchronous Pi-Calculus. ICALP 2000: 415-427.
    • (2000) ICALP , vol.2000 , pp. 415-427
    • Hennessy, M.1    Riely, J.2
  • 11
    • 0031648455 scopus 로고    scopus 로고
    • Secure Information Flow in a Multi-Threaded Imperative Language
    • Smith, G. and Volpano, D. M. (1998). Secure Information Flow in a Multi-Threaded Imperative Language. In Proc. of POPL 1998: 355-364.
    • (1998) Proc. of POPL , vol.1998 , pp. 355-364
    • Smith, G.1    Volpano, D.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.