메뉴 건너뛰기




Volumn 2127, Issue , 2001, Pages 27-41

Static analysis for secrecy and non-interference in networks of processes

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; SEMANTICS;

EID: 84937553676     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44743-1_3     Document Type: Conference Paper
Times cited : (34)

References (32)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by Typing In Security protocols
    • M. Abadi. Secrecy by Typing In Security protocols. Journal of the ACM, 5(46):18– 36, September 1999
    • (1999) Journal of the ACM , vol.5 , Issue.46
    • Abadi, M.1
  • 2
    • 84937720349 scopus 로고    scopus 로고
    • Security protocols and specifications
    • Springer
    • M. Abadi. Security protocols and specifications. In FoSSaCS’99, LNCS 1578, pages 1–13. Springer, 1999
    • (1999) FoSSaCS’99 , vol.1578 , pp. 1-13
    • Abadi, M.1
  • 3
    • 0035035153 scopus 로고    scopus 로고
    • Mobile Values, New names, and Secure Communication
    • ACM
    • M. Abadi, C. Fournet. Mobile Values, New names, and Secure Communication. In POPL’01, ACM, 2001
    • (2001) POPL’01
    • Abadi, M.1    Fournet, C.2
  • 4
    • 84937555465 scopus 로고    scopus 로고
    • Secrecy Types for Asymmetric Communication
    • Springer
    • M. Abadi, B. Blanchet. Secrecy Types for Asymmetric Communication. In FoSSaCS’01, LNCS 2030, pages 25–41. Springer, 2001
    • (2001) FoSSaCS’ , vol.2030 , pp. 25-41
    • Abadi, M.1    Blanchet, B.2
  • 5
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols - The Spi calculus
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols - The Spi calculus. Information and Computation 148, 1:1–70, January 1999
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 8
    • 84945976575 scopus 로고    scopus 로고
    • Control flow analysis for the π-calculus
    • Springer
    • C. Bodei, P. Degano, F. Nielson, and H. Riis Nielson. Control flow analysis for the π-calculus. In CONCUR’98, LNCS 1466, pages 84–98. Springer, 1998
    • (1998) CONCUR’98 , vol.1466 , pp. 84-98
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Riis Nielson, H.4
  • 9
    • 0029711237 scopus 로고    scopus 로고
    • An approach to the formal verification of cryptographic protocols
    • ACMPress
    • D. Bolignano. An approach to the formal verification of cryptographic protocols. In 3rd ACM Conf. on Computer and Communications Security, pages 106–118. ACMPress, 1996
    • (1996) 3Rd ACM Conf. On Computer and Communications Security , pp. 106-118
    • Bolignano, D.1
  • 10
    • 0000036723 scopus 로고
    • Testing equivalence for mobile processes
    • M. Boreale and R. De Nicola. Testing equivalence for mobile processes. Informationand Computation, 120(2):279–303, August 1995
    • (1995) Information , vol.120 , Issue.2 , pp. 279-303
    • Boreale, M.1    De Nicola, R.2
  • 11
    • 0032670228 scopus 로고    scopus 로고
    • Types for mobile ambients
    • ACMPress
    • L. Cardelli and A.D. Gordon. Types for mobile ambients. In POPL’99, pages 79–92. ACMPress, 1999
    • (1999) POPL’99 , pp. 79-92
    • Cardelli, L.1    Gordon, A.D.2
  • 13
    • 0020845493 scopus 로고
    • Testing equivalence for processes
    • R. De Nicola and M.C.B. Hennessy. Testing equivalence for processes. TheoreticalComputer Science, 34:83–133, 1984
    • (1984) Theoretical , vol.34 , pp. 83-133
    • De Nicola, R.1    Hennessy, M.2
  • 14
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • D. E. Denning. A Lattice Model of Secure Information Flow. Communications ofthe ACM, pages 236–243, May 1976
    • (1976) Communications Of , pp. 236-243
    • Denning, D.E.1
  • 15
    • 0017517624 scopus 로고
    • Certification of Programs for Secure Information Flow
    • D. E. Denning and P. J. Denning. Certification of Programs for Secure Information Flow. Communications of the ACM, pages 504–513, July 1977
    • (1977) Communications of the ACM , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 16
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev and A.C. Yao. On the security of public key protocols. IEEE Transactionson Information Theory, IT-29(12):198–208, March 1983
    • (1983) IEEE Transactions , vol.29 , Issue.12 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 17
    • 0020299523 scopus 로고
    • Security policy and security models
    • IEEE Press
    • J.A. Goguen and J. Meseguer. Security policy and security models. In 1982IEEESymposium on Research on Security and Privacy, pages 11–20. IEEE Press, 1982
    • (1982) 1982IEEE , pp. 11-20
    • Goguen, J.A.1    Meseguer, J.2
  • 18
    • 84957649493 scopus 로고    scopus 로고
    • Abstract interpretation of mobile ambients
    • R. R. Hansen, J. G. Jensen, F. Nielson, and H. R. Nielson. Abstract interpretation of mobile ambients. In SAS’99, LNCS 1694, pages 135–148, 1999
    • (1999) SAS’99 , vol.1694 , pp. 135-148
    • Hansen, R.R.1    Jensen, J.G.2    Nielson, F.3    Nielson, H.R.4
  • 19
    • 0031701347 scopus 로고    scopus 로고
    • The SLam calculus: Programming with secrecy and integrity
    • ACMPress
    • N. Heintze and J.G Riecke. The SLam calculus: Programming with secrecy and integrity. In POPL’98, pages 365–377. ACMPress, 1998
    • (1998) POPL’98 , pp. 365-377
    • Heintze, N.1    Riecke, J.G.2
  • 21
    • 19144372969 scopus 로고    scopus 로고
    • Flow logics and operational semantics
    • F. Nielson and H. R. Nielson. Flow logics and operational semantics. ElectronicNotes of Theoretical Computer Science, 10, 1998
    • (1998) Electronic
    • Nielson, F.1    Nielson, H.R.2
  • 22
  • 23
    • 84945268253 scopus 로고    scopus 로고
    • Control-Flow Analysis in Cubic Time
    • F. Nielson, H. Seidl. Control-Flow Analysis in Cubic Time. In ESOP’01, LNCS2028, pages 252–268, 2001
    • (2001) ESOP’01 , vol.2028 , pp. 252-268
    • Nielson, F.1    Seidl, H.2
  • 24
    • 0013162780 scopus 로고
    • Semantics with Applications: A Formal Introduction
    • H. Riis Nielson and F. Nielson. Semantics with Applications: A Formal Introduction. Wiley Professional Computing. Wiley, 1992
    • (1992) Wiley
    • Riis Nielson, H.1    Nielson, F.2
  • 26
    • 0030705795 scopus 로고    scopus 로고
    • Proving properties of security protocols by induction
    • IEEE
    • L.C. Paulson. Proving properties of security protocols by induction. In CSFW’97, pages 70–83. IEEE, 1997
    • (1997) CSFW’97 , pp. 70-83
    • Paulson, L.C.1
  • 27
    • 0031675817 scopus 로고    scopus 로고
    • A typed language for distributed mobile processes
    • ACMPress
    • J. Riely and M. Hennessy. A typed language for distributed mobile processes. In POPL’98, pages 378–390. ACMPress, 1998
    • (1998) POPL’98 , pp. 378-390
    • Riely, J.1    Hennessy, M.2
  • 28
    • 0032646395 scopus 로고    scopus 로고
    • Trust and partial typing in open systems of mobile agents
    • ACMPress
    • J. Riely and M. Hennessy. Trust and partial typing in open systems of mobile agents. In POPL’99, pages 93–104. ACMPress, 1999
    • (1999) POPL’99 , pp. 93-104
    • Riely, J.1    Hennessy, M.2
  • 29
    • 0346166969 scopus 로고    scopus 로고
    • Language Issues in Mobile Program Security
    • Springer
    • D. Volpano and G. Smith. Language Issues in Mobile Program Security. In MobileAgent Security, LNCS 1419, pages 25–43. Springer, 1998
    • (1998) Mobile , vol.1419 , pp. 25-43
    • Volpano, D.1    Smith, G.2
  • 30
    • 0031633213 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language
    • IEEE
    • D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. In CSFW’98, pages 34–43. IEEE, 1998
    • (1998) CSFW’98 , pp. 34-43
    • Volpano, D.1    Smith, G.2
  • 31
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • ACMPress
    • D. Volpano and G. Smith. Secure information flow in a multi-threaded imperative language. In POPL’98, pages 355–364. ACMPress, 1998
    • (1998) POPL’98 , pp. 355-364
    • Volpano, D.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.