메뉴 건너뛰기




Volumn 1782, Issue , 2000, Pages 180-199

Secure information flow as typed process behaviour

Author keywords

[No Author keywords available]

Indexed keywords

BIOMINERALIZATION; COMPUTER PROGRAMMING LANGUAGES; EMBEDDINGS; SYNTACTICS;

EID: 84947269249     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-46425-5_12     Document Type: Conference Paper
Times cited : (98)

References (36)
  • 3
    • 84947235213 scopus 로고    scopus 로고
    • Secure Communications Processing for Distributed Languages
    • IEEE
    • Abadi, M., Fournet, C. and Gonthier, G., Secure Communications Processing for Distributed Languages. LICS’98, 868-883, IEEE, 1998.
    • (1998) LICS’98 , pp. 868-883
    • Abadi, M.1    Fournet, C.2    Gonthier, G.3
  • 4
    • 0027574302 scopus 로고
    • Computational Interpretation of Linear Logic
    • Abramsky, S., Computational Interpretation of Linear Logic. TCS, vol 111, 1993.
    • (1993) TCS , vol.111
    • Abramsky, S.1
  • 5
    • 84945976575 scopus 로고    scopus 로고
    • Control Flow Analysis of n- Calculus
    • LNCS 1466, Springer
    • Bodei, C, Degano, P., Nielson, F., and Nielson, H. Control Flow Analysis of n- Calculus. CONCUR’98, LNCS 1466, 84-98, Springer, 1998.
    • (1998) CONCUR’98 , pp. 84-98
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Nielson, H.4
  • 6
    • 0030681154 scopus 로고    scopus 로고
    • The pi-calculus in direct style
    • ACM
    • Boudol, G., The pi-calculus in direct style, POPL’97, 228-241, ACM, 1997.
    • (1997) POPL’97 , pp. 228-241
    • Boudol, G.1
  • 7
    • 0017517624 scopus 로고    scopus 로고
    • Certification of programs for secure information flow
    • ACM
    • Denning, D. and Denning, P., Certification of programs for secure information flow. Communication of ACM, ACM, 20:504-513, 1997.
    • (1997) Communication of ACM , vol.20 , pp. 504-513
    • Denning, D.1    Denning, P.2
  • 8
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • Focardi, R. and Gorrieri, R., The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23(9), 1997.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9
    • Focardi, R.1    Gorrieri, R.2
  • 9
    • 4043088311 scopus 로고    scopus 로고
    • Types and Subtypes for Client-Server Interactions
    • LNCS 1576, Springer
    • Gay, S. and Hole, M., Types and Subtypes for Client-Server Interactions, ESOP’99, LNCS 1576, 74-90, Springer, 1999.
    • (1999) ESOP’99 , pp. 74-90
    • Gay, S.1    Hole, M.2
  • 10
    • 0023171371 scopus 로고
    • Linear Logic
    • Girard, J.-Y., Linear Logic, TCS, Vol. 50, 1-102, 1987.
    • (1987) TCS , vol.50 , pp. 1-102
    • Girard, J.-Y.1
  • 14
    • 85029492434 scopus 로고
    • Types for Dyadic Interaction
    • LNCS 715
    • Honda, K., Types for Dyadic Interaction. CONCUR’93, LNCS 715, 509-523, 1993.
    • (1993) CONCUR’93 , pp. 509-523
    • Honda, K.1
  • 15
    • 0029719979 scopus 로고    scopus 로고
    • Composing Processes
    • ACM
    • Honda, K., Composing Processes, POPL’96, 344-357, ACM, 1996.
    • (1996) POPL’96 , pp. 344-357
    • Honda, K.1
  • 16
    • 84947208033 scopus 로고    scopus 로고
    • QMW CS technical report 767
    • A full version of the present paper, QMW CS technical report 767, 1999. Available at http://www.dcs.qmw.ac.uk/~kohei.
    • (1999)
  • 17
    • 0029404929 scopus 로고
    • On Reduction-Based Process Semantics
    • Honda, K. and Yoshida, N. On Reduction-Based Process Semantics. TCS. 151, 437-486, 1995.
    • (1995) TCS , vol.151 , pp. 437-486
    • Honda, K.1    Yoshida, N.2
  • 18
    • 0000423953 scopus 로고    scopus 로고
    • Game-theoretic analysis of call-by-value computation
    • Honda, K. and Yoshida, N. Game-theoretic analysis of call-by-value computation. TCS, 221 (1999), 393-456, 1999.
    • (1999) TCS , vol.221 , pp. 393-456
    • Honda, K.1    Yoshida, N.2
  • 19
    • 0008540715 scopus 로고
    • Pi-calculus, dialogue games and PCF
    • ACM
    • Hyland, M. and Ong, L., Pi-calculus, dialogue games and PCF, FPCA’93, ACM, 1995.
    • (1995) FPCA’93
    • Hyland, M.1    Ong, L.2
  • 21
    • 0025251975 scopus 로고
    • Interaction Nets
    • ACM
    • Lafont, Y., Interaction Nets, POPL’90, 95-108, ACM, 1990.
    • (1990) POPL’90 , pp. 95-108
    • Lafont, Y.1
  • 22
    • 0026222347 scopus 로고
    • Bisimulation through probabilistic testing
    • Larsen, K. and Skou, A. Bisimulation through probabilistic testing. Information and Computation, 94:1-28, 1991.
    • (1991) Information and Computation , vol.94 , pp. 1-28
    • Larsen, K.1    Skou, A.2
  • 23
    • 84978984428 scopus 로고    scopus 로고
    • A Virtual Machine for the TyCO Process Calculus
    • LNCS 1702, Springer
    • Lopes, L, Silva, F. and Vasconcelos, F. A Virtual Machine for the TyCO Process Calculus. PPDP’99, 244-260, LNCS 1702, Springer, 1999.
    • (1999) PPDP’99 , pp. 244-260
    • Lopes, L.1    Silva, F.2    Vasconcelos, F.3
  • 24
    • 0005462619 scopus 로고    scopus 로고
    • MCS technical report, University of Leicester, 1999/3
    • Lowe, G. Defining Information Flow. MCS technical report, University of Leicester, 1999/3, 1999.
    • (1999) Defining Information Flow
    • Lowe, G.1
  • 27
    • 44049113210 scopus 로고
    • A Calculus of Mobile Processes
    • Milner, R., Parrow, J.G. and Walker, D.J., A Calculus of Mobile Processes, Info. & Comp. 100(1), pp.1-77, 1992.
    • (1992) Info. & Comp , vol.100 , Issue.1 , pp. 1-77
    • Milner, R.1    Parrow, J.G.2    Walker, D.J.3
  • 28
    • 0001518312 scopus 로고    scopus 로고
    • Typing and subtyping for mobile processes
    • Pierce, B and Sangiorgi D, Typing and subtyping for mobile processes, MSCS 6(5):409-453, 1996.
    • (1996) MSCS , vol.6 , Issue.5 , pp. 409-453
    • Pierce, B.1    Sangiorgi, D.2
  • 29
    • 0029713842 scopus 로고    scopus 로고
    • Intensional Specifications of Security Protocols
    • IEEE
    • Roscoe, A. W. Intensional Specifications of Security Protocols, CSFW’96, IEEE, 1996.
    • (1996) CSFW’96
    • Roscoe, A.W.1
  • 30
    • 0030260547 scopus 로고    scopus 로고
    • π-calculus, internal mobility, and agent-passing calculi
    • Sangiorgi, D. π-calculus, internal mobility, and agent-passing calculi. TCS, 167(2):235-271, 1996.
    • (1996) TCS , vol.167 , Issue.2 , pp. 235-271
    • Sangiorgi, D.1
  • 32
    • 85024747258 scopus 로고
    • Typed concurrent objects
    • LNCS 821, Springer
    • Vasconcelos, V., Typed concurrent objects. ECOOP’94, LNCS 821, pp.100-117. Springer, 1994.
    • (1994) ECOOP’94 , pp. 100-117
    • Vasconcelos, V.1
  • 33
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • ACM
    • Volpano, D. and Smith, G., Secure information flow in a multi-threaded imperative language, pp.355-364, POPL’98, ACM, 1998.
    • (1998) POPL’98 , pp. 355-364
    • Volpano, D.1    Smith, G.2
  • 35
    • 0030370740 scopus 로고    scopus 로고
    • A Sound type system for secure flow analysis
    • Volpano, D., Smith, G. and Irvine, C., A Sound type system for secure flow analysis. J. Computer Security, 4(2,3):167-187, 1996.
    • (1996) J. Computer Security , vol.4 , Issue.2-3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 36
    • 34250620825 scopus 로고    scopus 로고
    • Graph Types for Mobile Processes
    • LNCS 1180, Springer, 1996. The full version as LFCS Technical Report, ECS-LFCS-96-350
    • Yoshida, N. Graph Types for Mobile Processes. FST/TCS’16, LNCS 1180, pp.371-386, Springer, 1996. The full version as LFCS Technical Report, ECS-LFCS-96-350, 1996
    • (1996) FST/TCS’16 , pp. 371-386
    • Yoshida, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.