메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 3-17

Approximate non-interference

Author keywords

Computer languages; Computer security; Conferences; Educational institutions; Information security; Parallel processing; Power system security; System testing

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; SECURITY SYSTEMS; SEMANTICS;

EID: 84948746951     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2002.1021803     Document Type: Conference Paper
Times cited : (81)

References (27)
  • 2
    • 84948833881 scopus 로고    scopus 로고
    • D. Clark, S. Hunt, and P. Malacaria. private communication. July 2001
    • D. Clark, S. Hunt, and P. Malacaria. private communication. July 2001.
  • 3
    • 85050550846 scopus 로고
    • Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints
    • Los Angeles
    • P. Cousot and R. Cousot. Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints. In Symposium on Principles of Programming Languages (POPL), pages 238-252, Los Angeles, 1977.
    • (1977) Symposium on Principles of Programming Languages (POPL) , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 4
    • 0029403439 scopus 로고
    • Nondeterminism and Infinite Computations in Constraint Programming
    • F.S. de Boer, A. Di Pierro, and C. Palamidessi. Nondeterminism and Infinite Computations in Constraint Programming. Theoretical Computer Science, 151(1):37-78, 1995.
    • (1995) Theoretical Computer Science , vol.151 , Issue.1 , pp. 37-78
    • De Boer, F.S.1    Di Pierro, A.2    Palamidessi, C.3
  • 5
    • 0012799565 scopus 로고    scopus 로고
    • Probabilistic confinement in a declarative framework
    • Declarative Programming - Selected Papers from AGP 2000 - La Havana, Cuba, Elsevier
    • A. Di Pierro, C. Hankin, and H. Wiklicky. Probabilistic confinement in a declarative framework. In Declarative Programming - Selected Papers from AGP 2000 - La Havana, Cuba, volume 48 of Electronic Notes in Theoretical Computer Science, pages 1-23. Elsevier, 2001.
    • (2001) Electronic Notes in Theoretical Computer Science , vol.48 , pp. 1-23
    • Di Pierro, A.1    Hankin, C.2    Wiklicky, H.3
  • 6
    • 0031645080 scopus 로고    scopus 로고
    • An operational semantics for Probabilistic Concurrent Constraint Programming
    • P. Iyer, Y. Choo, and D. Schmidt, editors, IEEE Computer Society Press
    • A. Di Pierro and H. Wiklicky. An operational semantics for Probabilistic Concurrent Constraint Programming. In P. Iyer, Y. Choo, and D. Schmidt, editors, ICCL'98 - International Conference on Computer Languages, pages 174-183. IEEE Computer Society Press, 1998.
    • (1998) ICCL'98 - International Conference on Computer Languages , pp. 174-183
    • Di Pierro, A.1    Wiklicky, H.2
  • 7
    • 84896771832 scopus 로고    scopus 로고
    • Probabilistic Concurrent Constraint Programming: Towards a fully abstract model
    • L. Brim, J. Gruska, and J. Zlatuska, editors, MFCS'98 - Mathematical Foundations of Computer Science, Berlin - New York, August Springer Verlag
    • A. Di Pierro and H. Wiklicky. Probabilistic Concurrent Constraint Programming: Towards a fully abstract model. In L. Brim, J. Gruska, and J. Zlatuska, editors, MFCS'98 - Mathematical Foundations of Computer Science, volume 1450 of Lecture Notes in Computer Science, pages 446-455, Berlin - New York, August 1998. Springer Verlag.
    • (1998) Lecture Notes in Computer Science , vol.1450 , pp. 446-455
    • Di Pierro, A.1    Wiklicky, H.2
  • 8
    • 0020299523 scopus 로고
    • Security Policies and Security Models
    • IEEE Computer Society Press
    • J. Goguen and J. Meseguer. Security Policies and Security Models. In IEEE Symposium on Security and Privacy, pages 11-20. IEEE Computer Society Press, 1982.
    • (1982) IEEE Symposium on Security and Privacy , pp. 11-20
    • Goguen, J.1    Meseguer, J.2
  • 10
    • 0010974144 scopus 로고    scopus 로고
    • American Mathematical Society, Providence, Rhode Island, second revised edition
    • C. M. Grinstead and J.L. Snell. Introduction to Probability. American Mathematical Society, Providence, Rhode Island, second revised edition, 1997.
    • (1997) Introduction to Probability
    • Grinstead, C.M.1    Snell, J.L.2
  • 11
    • 0003062448 scopus 로고
    • Cryptanalysis of Diffie-Hellman, RSA, DSS, and other cryptosystems using timing attacks
    • D. Coppersmith, editor, Advances in Cryptology, CRYPTO '95: 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Berlin - Heidelberg - London, Springer-Verlag
    • P. C. Kocher. Cryptanalysis of Diffie-Hellman, RSA, DSS, and other cryptosystems using timing attacks. In D. Coppersmith, editor, Advances in Cryptology, CRYPTO '95: 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, volume 963 of Lecture Notes in Computer Science, pages 171-183, Berlin - Heidelberg - London, 1995. Springer-Verlag.
    • (1995) Lecture Notes in Computer Science , vol.963 , pp. 171-183
    • Kocher, P.C.1
  • 12
    • 0026222347 scopus 로고
    • Bisimulation through probabilistic testing
    • September
    • K.G. Larsen and A. Skou. Bisimulation through probabilistic testing. Information and Computation, 94(1):1-28, September 1991.
    • (1991) Information and Computation , vol.94 , Issue.1 , pp. 1-28
    • Larsen, K.G.1    Skou, A.2
  • 16
    • 0035067847 scopus 로고    scopus 로고
    • Process algebra and non-interference
    • Special Issue on CSFW-12
    • P.Y.A. Ryan and S.A. Schneider. Process algebra and non-interference. Journal of Computer Security, 9(1/2):75-103, 2001. Special Issue on CSFW-12.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 75-103
    • Ryan, P.Y.A.1    Schneider, S.A.2
  • 17
    • 84957869855 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • ESOP'99, Springer Verlag
    • A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. In ESOP'99, number 1576 in Lecture Notes in Computer Science, pages 40-58. Springer Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , Issue.1576 , pp. 40-58
    • Sabelfeld, A.1    Sands, D.2
  • 21
    • 0003885668 scopus 로고    scopus 로고
    • Mathematical Statistics
    • Springer Verlag, New York - Berlin - Heidelberg
    • J. Shao. Mathematical Statistics. Springer Texts in Statistics. Springer Verlag, New York - Berlin - Heidelberg, 1999.
    • (1999) Springer Texts in Statistics
    • Shao, J.1
  • 22
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • San Diego, California, ACM
    • G. Smith and D. Volpano. Secure information flow in a multi-threaded imperative language. In Symposium on Principles of Programming Languages (POPL'98), pages 355-364, San Diego, California, 1998. ACM.
    • (1998) Symposium on Principles of Programming Languages (POPL'98) , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 24
    • 84879525367 scopus 로고    scopus 로고
    • Towards quantitative verification of probabilistic transition systems
    • ICALP: 28th International Colloquium on Automata, Languages and Programming, Springer Verlag
    • F. van Breugel and J. Worrell. Towards quantitative verification of probabilistic transition systems. In ICALP: 28th International Colloquium on Automata, Languages and Programming, volume 2076 of Lecture Notes in Computer Science, pages 421-432. Springer Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2076 , pp. 421-432
    • Van Breugel, F.1    Worrell, J.2
  • 25
    • 0001909368 scopus 로고    scopus 로고
    • Confinement properties for programming languages
    • September
    • D. Volpano and G. Smith. Confinement properties for programming languages. SIGACTNews, 29(3):33-42, September 1998.
    • (1998) SIGACTNews , vol.29 , Issue.3 , pp. 33-42
    • Volpano, D.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.