메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 320-330

A simple view of type-secure information flow in the π-calculus

(1)  Pottier, F a  

a INRIA   (France)

Author keywords

Calculus; Computer security; Conferences; Encoding; Information analysis; Leak detection; Safety; Timing

Indexed keywords

ACCIDENT PREVENTION; ENCODING (SYMBOLS); INFORMATION ANALYSIS; LEAK DETECTION; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84948737028     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2002.1021826     Document Type: Conference Paper
Times cited : (64)

References (28)
  • 4
    • 84937705299 scopus 로고    scopus 로고
    • Static analysis of processes for no read-up and no write-down
    • W. Thomas, editor, Proceedings of FoSSaCS'99, Springer, Mar.
    • C. Bodei, P. Degano, F. Nielson, and H. R. Nielson. Static analysis of processes for no read-up and no write-down. In W. Thomas, editor, Proceedings of FoSSaCS'99, volume 1578 of Lecture Notes in Computer Science, pages 120-134. Springer, Mar. 1999. URL: http://www.di.unipi.it/~chiara/publ-40/BDNN99.ps.
    • (1999) Lecture Notes in Computer Science , vol.1578 , pp. 120-134
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Nielson, H.R.4
  • 7
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • R. Focardi and R. Gorrieri. A classification of security properties for process algebras. Journal of Computer Security, 3(1):5-33, 1995. URL: http://www.cs.unibo.it/~gorrieri/Papers/jcsfinal.ps.gz.
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 8
    • 20144362494 scopus 로고    scopus 로고
    • Technical Report University of Sussex, Nov.
    • M. Hennessy. The security picalculus and noninterference. Technical Report 2000:05, University of Sussex, Nov. 2000. URL: ftp://ftp.cogs.susx.ac.uk/pub/reports/compsci/cs052000.ps.Z.
    • (2000) The Security Picalculus and Noninterference
    • Hennessy, M.1
  • 9
    • 84974577536 scopus 로고    scopus 로고
    • Information flow vs. resource access in the asynchronous pi-calculus
    • Proceedings of the 27th International Colloquium on Automata, Languages and Programming, Springer-Verlag, July
    • M. Hennessy and J. Riely. Information flow vs. resource access in the asynchronous pi-calculus. In Proceedings of the 27th International Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science. Springer-Verlag, July 2000. URL: http://www.depaul.edu/~jriely/papers/00icalp.ps.gz.
    • (2000) Lecture Notes in Computer Science
    • Hennessy, M.1    Riely, J.2
  • 11
    • 84947269249 scopus 로고    scopus 로고
    • Secure information flow as typed process behaviour
    • G. Smolka, editor, Proceedings of the 2000 European Symposium on Programming (ESOP'00), Springer Verlag, Mar.
    • K. Honda, V. Vasconcelos, and N. Yoshida. Secure information flow as typed process behaviour. In G. Smolka, editor, Proceedings of the 2000 European Symposium on Programming (ESOP'00), volume 1782 of Lecture Notes in Computer Science, pages 180-199. Springer Verlag, Mar. 2000. URL: ftp://ftp.dcs.qmw.ac.uk/lfp/kohei/siftp-esop00.ps.gz.
    • (2000) Lecture Notes in Computer Science , vol.1782 , pp. 180-199
    • Honda, K.1    Vasconcelos, V.2    Yoshida, N.3
  • 13
    • 0034714632 scopus 로고    scopus 로고
    • Type reconstruction for linear π-calculus with I/O subtyping
    • Aug.
    • A. Igarashi and N. Kobayashi. Type reconstruction for linear π-calculus with I/O subtyping. Information & Computation, 161:1-44, Aug. 2000. URL: http://www.graco.c.u-tokyo.ac.jp/~igarashi/papers/LinearPi.ps.gz.
    • (2000) Information & Computation , vol.161 , pp. 1-44
    • Igarashi, A.1    Kobayashi, N.2
  • 15
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • IEEE Press
    • J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. IEEE Press, 1994. URL: http://chacs.nrl.navy.mil/publications/CHACS/1994/1994mclean-sp.ps.
    • (1994) Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy
    • McLean, J.1
  • 16
    • 0003604327 scopus 로고
    • Technical Report Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh, Oct.
    • R. Milner. The polyadic π-calculus: a tutorial. Technical Report ECS-LFCS-91-180, Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh, Oct. 1991. URL: ftp://ftp.cl.cam.ac.uk/users/rm135/ppi.ps.Z.
    • (1991) The Polyadic π-calculus: A Tutorial
    • Milner, R.1
  • 17
    • 84968816021 scopus 로고
    • Barbed bisimulation
    • W. Kuich, editor, International Colloquium on Automata, Languages and Programming, Vienna, Austria, July Springer-Verlag
    • R. Milner and D. Sangiorgi. Barbed bisimulation. In W. Kuich, editor, International Colloquium on Automata, Languages and Programming, volume 623 of Lecture Notes in Computer Science, pages 685-695, Vienna, Austria, July 1992. Springer-Verlag. URL: ftp://ftp-sop.inria.fr/meije/theorie-par/davides/bn.ps.gz.
    • (1992) Lecture Notes in Computer Science , vol.623 , pp. 685-695
    • Milner, R.1    Sangiorgi, D.2
  • 22
    • 0033719707 scopus 로고    scopus 로고
    • Secure composition of untrusted code: Wrappers and causality types
    • IEEE Computer Society Press, July
    • P. Sewell and J. Vitek. Secure composition of untrusted code: Wrappers and causality types. In Proceedings of the 13th Computer Security Foundations Workshop. IEEE Computer Society Press, July 2000. URL: http://www.cl.cam.ac.uk/users/pes20/wraptypes.ps.gz.
    • (2000) Proceedings of the 13th Computer Security Foundations Workshop
    • Sewell, P.1    Vitek, J.2
  • 24
    • 0034835461 scopus 로고    scopus 로고
    • A new type system for secure information flow
    • Cape Breton, Nova Scotia, June
    • G. S. Smith. A new type system for secure information flow. In Proc. 14th IEEE Computer Security Foundations Workshop, pages 115-125, Cape Breton, Nova Scotia, June 2001. URL: http://www.cs.fiu.edu/~smithg/papers/csfw01.ps.gz.
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop , pp. 115-125
    • Smith, G.S.1
  • 25
    • 84947920982 scopus 로고    scopus 로고
    • Graph types for monadic mobile processes
    • V. Chandru and V. Vinay, editors, Proceedings of the 16th Conference on Foundations of Software Technology and Theoretical Computer Science, Springer-Verlag
    • N. Yoshida. Graph types for monadic mobile processes. In V. Chandru and V. Vinay, editors, Proceedings of the 16th Conference on Foundations of Software Technology and Theoretical Computer Science, volume 1180 of Lecture Notes in Computer Science, pages 371-386. Springer-Verlag, 1996. URL: http://www.mcs.le.ac.uk/~nyoshida/paper/graph1-short.ps.gz.
    • (1996) Lecture Notes in Computer Science , vol.1180 , pp. 371-386
    • Yoshida, N.1
  • 26
    • 26344459336 scopus 로고    scopus 로고
    • Technical Report University of Leicester, Dec.
    • N. Yoshida, K. Honda, and M. Berger. Linearity and bisimulation. Technical Report MSC-2001/48, University of Leicester, Dec. 2001. URL: http://www.mcs.le.ac.uk/~nyoshida/paper/lb.ps.gz.
    • (2001) Linearity and Bisimulation
    • Yoshida, N.1    Honda, K.2    Berger, M.3
  • 27
    • 19044369934 scopus 로고    scopus 로고
    • Linearity and bisimulation
    • Proceedings of 5th International Conference of Foundations of Software Science and Computer Structures (FoSSaCs 2002), Springer Verlag, Apr.
    • N. Yoshida, K. Honda, and M. Berger. Linearity and bisimulation. In Proceedings of 5th International Conference of Foundations of Software Science and Computer Structures (FoSSaCs 2002), Lecture Notes in Computer Science. Springer Verlag, Apr. 2002. URL: http://www.mcs.le.ac.uk/~nyoshida/paper/fossacs-ca-final.ps.gz.
    • (2002) Lecture Notes in Computer Science
    • Yoshida, N.1    Honda, K.2    Berger, M.3
  • 28
    • 84945262623 scopus 로고    scopus 로고
    • Secure information flow and CPS
    • D. Sands, editor, Proceedings of the 2001 European Symposium on Programming (ESOP'01), Genova, Italy, Apr. Springer Verlag
    • S. Zdancewic and A. C. Myers. Secure information flow and CPS. In D. Sands, editor, Proceedings of the 2001 European Symposium on Programming (ESOP'01), Lecture Notes in Computer Science, Genova, Italy, Apr. 2001. Springer Verlag. URL: http://www.cs.cornell.edu/zdance/lincont.ps.
    • (2001) Lecture Notes in Computer Science
    • Zdancewic, S.1    Myers, A.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.