메뉴 건너뛰기




Volumn 2422, Issue , 2002, Pages 271-286

Transforming processes to check and ensure information flow security

Author keywords

[No Author keywords available]

Indexed keywords

SEMANTICS;

EID: 84944047063     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45719-4_19     Document Type: Conference Paper
Times cited : (5)

References (22)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by Typing in Security Protocols
    • M. Abadi. Secrecy by Typing in Security Protocols. Journal of the ACM, 46(5): 749–786, 1999. 271
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 6
    • 0001439194 scopus 로고    scopus 로고
    • The Compositional Security Checker: A Tool for the Verification if Information Flow Security Properties
    • R. Focardi and R. Gorrieri. The Compositional Security Checker: A Tool for the Verification if Information Flow Security Properties. IEEE Transactions on Software Engineering, 23(9): 550–571, 1997. 276, 277
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 7
    • 84988393004 scopus 로고    scopus 로고
    • Classification of Security Properties (Part I: Information Flow)
    • In R. Focardi and R. Gorrieri, editors, of LNCS. Springer
    • R. Focardi and R. Gorrieri. Classification of Security Properties (Part I: Information Flow). In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS. Springer, 2001. 271, 272, 273, 275, 276, 277, 279, 280, 283
    • (2001) Foundations of Security Analysis and Design , vol.2171
    • Focardi, R.1    Gorrieri, R.2
  • 15
    • 0028058408 scopus 로고
    • A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions
    • IEEE Computer Society Press
    • J. McLean. “A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions”. In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, 1994. 271
    • (1994) In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy
    • McLean, J.1
  • 17
    • 0030705795 scopus 로고    scopus 로고
    • Proving Properties of Security Protocols by Induction
    • IEEE Computer Society Press
    • L. C. Paulson. Proving Properties of Security Protocols by Induction. In Proc. of the IEEE Computer Security Foundations Workshop, pages 70–83. IEEE Computer Society Press, 1997. 271
    • (1997) In Proc. Of the IEEE Computer Security Foundations Workshop , pp. 70-83
    • Paulson, L.C.1
  • 19


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.