메뉴 건너뛰기




Volumn 88, Issue 2, 2015, Pages 217-236

Control and synthesis of non-interferent timed systems

Author keywords

control; non interference; safety timed games; synthesis; timed automaton

Indexed keywords

AUTOMATA THEORY; CONTROL; DISCRETE EVENT SIMULATION; SYNTHESIS (CHEMICAL); TIME SHARING SYSTEMS;

EID: 84920148827     PISSN: 00207179     EISSN: 13665820     Source Type: Journal    
DOI: 10.1080/00207179.2014.944356     Document Type: Article
Times cited : (24)

References (42)
  • 2
    • 0037834671 scopus 로고    scopus 로고
    • A decidable notion of timed noninterference
    • Barbuti, R., & Tesei, L. (2003). A decidable notion of timed noninterference. Fundamenta Informaticae, 54, 137-150.
    • (2003) Fundamenta Informaticae , vol.54 , pp. 137-150
    • Barbuti, R.1    Tesei, L.2
  • 5
    • 35348884907 scopus 로고    scopus 로고
    • Exposing private information by timing web applications
    • P. Patel-Schneider & P. Shenoy (Eds.) Banff, Alberta, Canada: ACM
    • Bortz, A., & Boneh, D. (2007). Exposing private information by timing web applications. In P. Patel-Schneider & P. Shenoy (Eds.), Proceedings of the 16th International Conference on World Wide Web (WWW '07) (pp. 621-628). Banff, Alberta, Canada: ACM.
    • (2007) Proceedings of the 16th International Conference on World Wide Web (WWW '07) , pp. 621-628
    • Bortz, A.1    Boneh, D.2
  • 6
    • 34249893892 scopus 로고    scopus 로고
    • Compositional information flow security for concurrent programs
    • Bossi, A., Piazza, C., & Rossi, S. (2007). Compositional information flow security for concurrent programs. Journal of Computer Security, 15, 373-416.
    • (2007) Journal of Computer Security , vol.15 , pp. 373-416
    • Bossi, A.1    Piazza, C.2    Rossi, S.3
  • 18
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • Focardi, R., & Gorrieri, R. (1997). The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23, 550-571.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 23
    • 84951072180 scopus 로고    scopus 로고
    • Discrete-time control for rectangular hybrid automata
    • P. Degano, R. Gorrieri, & A. Marchetti-Spaccamela (Eds.) Bologna, Italy: Santa Barabara
    • Henzinger, T., & Kopke, P. (1997). Discrete-time control for rectangular hybrid automata. In P. Degano, R. Gorrieri, & A. Marchetti-Spaccamela (Eds.), International Colloquium on Automata, Languages and Programming (ICALP'97) (pp. 582-593). Bologna, Italy: Santa Barabara.
    • (1997) International Colloquium on Automata, Languages and Programming (ICALP'97) , pp. 582-593
    • Henzinger, T.1    Kopke, P.2
  • 24
    • 43449093752 scopus 로고    scopus 로고
    • Formalizing non-interference for a simple bytecode language in Coq
    • Kammuller, F. (2008). Formalizing non-interference for a simple bytecode language in Coq. Formal Aspects of Computing, 20, 259-275.
    • (2008) Formal Aspects of Computing , vol.20 , pp. 259-275
    • Kammuller, F.1
  • 25
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • N. Koblitz (Ed.) Santa Barabara, CA: Springer-Verlag
    • Kocher, P.C. (1996). Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In N. Koblitz (Ed.), International CryptologyConference (CRYPTO'96) (pp. 104-113). Santa Barabara, CA: Springer-Verlag.
    • (1996) International CryptologyConference (CRYPTO'96) , pp. 104-113
    • Kocher, P.C.1
  • 27
    • 70449657350 scopus 로고    scopus 로고
    • Noninterference for a practical DIFC-based operating system
    • A.Myers&D. Evans (Eds.) Washington, DC: IEEE Computer Society
    • Krohn, M., & Tromer, E. (2009). Noninterference for a practical DIFC-based operating system. In A.Myers&D. Evans (Eds.), Proceedings of the 2009 30th IEEE Symposium on Security and Privacy (pp. 61-76). Washington, DC: IEEE Computer Society.
    • (2009) Proceedings of the 2009 30th IEEE Symposium on Security and Privacy , pp. 61-76
    • Krohn, M.1    Tromer, E.2
  • 28
  • 29
    • 0034439108 scopus 로고    scopus 로고
    • Effective control synthesis for des under partial observations
    • Sydney, Australia: IEEE
    • Lamouchi, H., & Thistle, J. (2000). Effective control synthesis for DES under partial observations. In IEEE Conference on Decision and Control (pp. 22-28). Sydney, Australia: IEEE.
    • (2000) IEEE Conference on Decision and Control , pp. 22-28
    • Lamouchi, H.1    Thistle, J.2
  • 31
    • 0023995784 scopus 로고
    • On observability of discrete-event systems
    • Lin, F., &Wonham, W. (1988). On observability of discrete-event systems. Information Sciences, 44, 173-198.
    • (1988) Information Sciences , vol.44 , pp. 173-198
    • Lin, F.1    Wonham, W.2
  • 32
    • 0029270831 scopus 로고
    • Supervisory control of timed discrete-event systems under partial observation
    • Lin, F., & Wonham, W. (1995). Supervisory control of timed discrete-event systems under partial observation. IEEE Transactions on Automatic Control, 40, 558-562.
    • (1995) IEEE Transactions on Automatic Control , vol.40 , pp. 558-562
    • Lin, F.1    Wonham, W.2
  • 35
    • 68949196207 scopus 로고    scopus 로고
    • Modifying security policies for the satisfaction of intransitive noninterference
    • Moez, Y., Lin, F., & Ben Hadj-Alouane, N. (2009). Modifying security policies for the satisfaction of intransitive noninterference. IEEE Transactions on Automatic Control, 54, 1961-1966.
    • (2009) IEEE Transactions on Automatic Control , vol.54 , pp. 1961-1966
    • Moez, Y.1    Lin, F.2    Ben Hadj-Alouane, N.3
  • 39
    • 62949219238 scopus 로고    scopus 로고
    • Opacity-enforcing supervisory strategies for secure discrete event systems
    • Cancun, Mexico: IEEE
    • Saboori, A., & Hadjicostis, C. (2008). Opacity-enforcing supervisory strategies for secure discrete event systems. In the 47th IEEE Conference on Decision and Control (pp. 889-894). Cancun, Mexico: IEEE.
    • (2008) The 47th IEEE Conference on Decision and Control , pp. 889-894
    • Saboori, A.1    Hadjicostis, C.2
  • 40
    • 0015773009 scopus 로고
    • Word problems requiring exponential time: Preliminary report
    • A.V. Aho, A.B. Borodin, R.L Constable, R.W. Floyd, M.A. Harrison, R.M. Karp, & H.R. Strong (Eds.) San Diego, CA: ACM
    • Stockmeyer, L.J., & Meyer, A.R. (1973). Word problems requiring exponential time: Preliminary report. In A.V. Aho, A.B. Borodin, R.L Constable, R.W. Floyd, M.A. Harrison, R.M. Karp, & H.R. Strong (Eds.), ACM Symposium on Theory of Computing (STOC'73) (pp. 1-9). San Diego, CA: ACM.
    • (1973) ACM Symposium on Theory of Computing (STOC'73) , pp. 1-9
    • Stockmeyer, L.J.1    Meyer, A.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.