메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 29-43

Observational determinism for concurrent program security

Author keywords

Computer science; Computer security; Concurrent computing; Data security; Government; Information science; Information security; Timing; Web server; Yarn

Indexed keywords

BIOMINERALIZATION; COMPUTER SCIENCE; INFORMATION SCIENCE; KNOWLEDGE BASED SYSTEMS; SECURITY SYSTEMS; YARN;

EID: 84942242915     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2003.1212703     Document Type: Conference Paper
Times cited : (237)

References (50)
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Jan.
    • M. Abadi and A. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, Jan. 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.2
  • 7
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning. A lattice model of secure information flow. Comm. of the ACM, 19(5):236-243, May 1976.
    • (1976) Comm. of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 8
    • 0017517624 scopus 로고
    • Certification of Programs for Secure Information Flow
    • July
    • D. E. Denning and P. J. Denning. Certification of Programs for Secure Information Flow. Comm. of the ACM, 20(7):504-513, July 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 12
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • Sept.
    • R. Focardi and R. Gorrieri. The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23(9), Sept. 1997.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9
    • Focardi, R.1    Gorrieri, R.2
  • 14
  • 16
    • 0026850049 scopus 로고
    • A logical approach to multilevel security of probabilistic systems
    • IEEE Computer Society Press
    • J. Gray III and P. F. Syverson. A logical approach to multilevel security of probabilistic systems. In Proceedings of the IEEE Symposium on Security and Privacy, pages 164-176. IEEE Computer Society Press, 1992.
    • (1992) Proceedings of the IEEE Symposium on Security and Privacy , pp. 164-176
    • Gray, J.1    Syverson, P.F.2
  • 20
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Oct.
    • B. W. Lampson. A note on the confinement problem. Comm. of the ACM, 16(10):613-615, Oct. 1973.
    • (1973) Comm. of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 22
    • 84872691539 scopus 로고    scopus 로고
    • A unifying approach to the security of distributed and multi-threaded programs
    • To appear
    • H. Mantel and A. Sabelfeld. A unifying approach to the security of distributed and multi-threaded programs. Journal of Computer Security, 2002. To appear.
    • (2002) Journal of Computer Security
    • Mantel, H.1    Sabelfeld, A.2
  • 23
    • 0023829319 scopus 로고
    • Noninterference and the composability of security properties
    • IEEE Computer Society Press, May
    • D. McCullough. Noninterference and the composability of security properties. In Proc. IEEE Symposium on Security and Privacy, pages 177-186. IEEE Computer Society Press, May 1988.
    • (1988) Proc. IEEE Symposium on Security and Privacy , pp. 177-186
    • McCullough, D.1
  • 24
    • 84974747891 scopus 로고
    • Proving noninterference and functional correctness using traces
    • J. McLean. Proving noninterference and functional correctness using traces. Journal of Computer Security, 1(1), 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.1
    • McLean, J.1
  • 25
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • IEEE Computer Society Press, May
    • J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proc. IEEE Symposium on Security and Privacy, pages 79-93. IEEE Computer Society Press, May 1994.
    • (1994) Proc. IEEE Symposium on Security and Privacy , pp. 79-93
    • McLean, J.1
  • 28
    • 84955596529 scopus 로고
    • Trust in the λ-calculus
    • Proc. 2nd International Symposium on Static Analysis, Springer, Sept.
    • J. Palsberg and P. Ørbæk. Trust in the λ-calculus. In Proc. 2nd International Symposium on Static Analysis, number 983 in Lecture Notes in Computer Science, pages 314-329. Springer, Sept. 1995.
    • (1995) Lecture Notes in Computer Science , Issue.983 , pp. 314-329
    • Palsberg, J.1    Ørbæk, P.2
  • 34
    • 0003142759 scopus 로고
    • A CSP formulation of non-interference and unwinding
    • P. Ryan. A CSP formulation of non-interference and unwinding. Cipher, pages 19-30, 1991.
    • (1991) Cipher , pp. 19-30
    • Ryan, P.1
  • 36
    • 84958755151 scopus 로고    scopus 로고
    • Static confidentiality enforcement for distributed programs
    • Proceedings of the 9th Static Analysis Symposium, Springer- Verlag
    • A. Sabelfeld and H. Mantel. Static confidentiality enforcement for distributed programs. In Proceedings of the 9th Static Analysis Symposium, volume 2477 of Lecture Notes in Computer Science. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2477
    • Sabelfeld, A.1    Mantel, H.2
  • 40
    • 84947255140 scopus 로고    scopus 로고
    • Alias types
    • Proc. of the 9th European Symposium on Programming
    • F. Smith, D. Walker, and G. Morrisett. Alias types. In Proc. of the 9th European Symposium on Programming, volume 1782 of Lecture Notes in Computer Science, pages 366-381, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1782 , pp. 366-381
    • Smith, F.1    Walker, D.2    Morrisett, G.3
  • 41
    • 0034835461 scopus 로고    scopus 로고
    • A new type system for secure information flow
    • IEEE Computer Society Press, June
    • G. Smith. A new type system for secure information flow. In Proc. of the 14th IEEE Computer Security Foundations Workshop, pages 115-125. IEEE Computer Society Press, June 2001.
    • (2001) Proc. of the 14th IEEE Computer Security Foundations Workshop , pp. 115-125
    • Smith, G.1
  • 43
    • 0033330060 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language
    • Nov.
    • D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. Journal of Computer Security, 7(2,3):231-253, Nov. 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 231-253
    • Volpano, D.1    Smith, G.2
  • 49
    • 0036761582 scopus 로고    scopus 로고
    • Secure information flow via linear continuations
    • Sept.
    • S. Zdancewic and A. C. Myers. Secure information flow via linear continuations. Higher Order and Symbolic Computation, 15(2-3):209-234, Sept. 2002.
    • (2002) Higher Order and Symbolic Computation , vol.15 , Issue.2-3 , pp. 209-234
    • Zdancewic, S.1    Myers, A.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.