메뉴 건너뛰기




Volumn 2171 LNCS, Issue , 2001, Pages 1-62

Mathematical models of computer security

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING PROCEDURES; SECURITY OF DATA; SECURITY SYSTEMS; SEMANTICS;

EID: 84949243805     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45608-2_1     Document Type: Conference Paper
Times cited : (62)

References (91)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for Cryptographic Protocols: The Spi Calculus
    • Abadi, M. and Gordon, A.: A calculus for Cryptographic Protocols: the Spi Calculus, Information and Computation (1999)
    • (1999) Information and Computation
    • Abadi, M.1    Gordon, A.2
  • 7
    • 0000015719 scopus 로고
    • An Improved Failures Model for Communicating Sequential Processes Springer Verlag
    • Brookes, S. D. and Roscoe, A. W.: An Improved Failures Model for Communicating Sequential Processes Springer Verlag, Proceedings NSF-SERC Seminar on Concurrency (1985) 17
    • (1985) Proceedings NSF-SERC Seminar on Concurrency , pp. 17
    • Brookes, S.D.1    Roscoe, A.W.2
  • 10
    • 0012035918 scopus 로고
    • Testing equivalence as a bisimulation equivalence
    • Cleaveland, R. and Hennessy, M.: Testing equivalence as a bisimulation equivalence. Formal Aspects of Computing, Volume 5, (1993) 1-20 44
    • (1993) Formal Aspects of Computing , vol.5 , pp. 1-20
    • Cleaveland, R.1    Hennessy, M.2
  • 12
    • 84947902524 scopus 로고    scopus 로고
    • Advances in Cryptology - EUROCRYPT ’96 (Lecture Notes in Computer Science 1070), Springer-Verlag
    • Coppersmith, D. et al.: Low-exponent RSA with related messages. In Advances in Cryptology - EUROCRYPT ’96 (Lecture Notes in Computer Science 1070), Springer-Verlag, (1996) 1-9 54
    • (1996) Low-Exponent RSA with Related Messages , pp. 1-9
    • Coppersmith, D.1
  • 16
    • 0039926997 scopus 로고    scopus 로고
    • A Compiler for Analysing Cryptographic Protocols using Non-Interference
    • Durante, A. et al: A Compiler for Analysing Cryptographic Protocols using Non-Interference, ACM Trans. on Soft.Eng. and Method, 9(4) (2000) 1-9 54
    • (2000) ACM Trans. on Soft.Eng. and Method , vol.9 , Issue.4 , pp. 1-9
    • Durante, A.1
  • 17
    • 85045337770 scopus 로고    scopus 로고
    • http://www.formal.demon.co.uk/36
  • 19
    • 84974776068 scopus 로고
    • A Classification of Security Properties
    • Focardi, R. and Gorrieri, R.: A Classification of Security Properties, JCS, 3(1): (1995) 5-33 34, 46
    • (1995) JCS , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 21
    • 0001439194 scopus 로고    scopus 로고
    • The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
    • Focardi, R., Gorrieri, R.: The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Trans. on Soft. Eng., 23(9): (1997) 550-571 16
    • (1997) IEEE Trans. on Soft. Eng. , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 23
    • 0030680628 scopus 로고    scopus 로고
    • The Specification and Implementation of Commercial Security Requirements including Dynamic Segregation of Duties
    • ACM Press
    • Foley, S. N.: The Specification and Implementation of Commercial Security Requirements including Dynamic Segregation of Duties, 4th ACM Conference on Computer and Communications Security, ACM Press, (1997) 10
    • (1997) 4Th ACM Conference on Computer and Communications Security , pp. 10
    • Foley, S.N.1
  • 24
    • 0029391751 scopus 로고
    • Algebraic Proofs of Consistency and Completeness
    • Gardiner, P.: Algebraic Proofs of Consistency and Completeness. Theoretic Computer Science, (1995) 150-161 34
    • (1995) Theoretic Computer Science , pp. 150-161
    • Gardiner, P.1
  • 25
    • 0005451427 scopus 로고    scopus 로고
    • Power simulation and its relation to traces and failures refinement
    • Gardiner, P.: Power simulation and its relation to traces and failures refinement, ENTCS, vol 32, URL: http://www.elsevier.nl/locate/entcs/volume32.html35
    • ENTCS , vol.32
    • Gardiner, P.1
  • 32
    • 0016984825 scopus 로고
    • Protection in operating systems
    • Harrison, M. A. et al: Protection in operating systems. Communications of the ACM, 19(8), August (1976) 461-471 9
    • (1976) Communications of the ACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.A.1
  • 47
    • 85045347654 scopus 로고    scopus 로고
    • Probabilistic polynomial-time equivalence and security analysis
    • Lincoln, P. et al: Probabilistic polynomial-time equivalence and security analysis, Proceedings of FM’99 (1999) 54
    • (1999) Proceedings of FM’99 , pp. 54
    • Lincoln, P.1
  • 51
    • 85045301019 scopus 로고    scopus 로고
    • Unwinding Possibilistic Security Properties
    • Mantel, H.: Unwinding Possibilistic Security Properties. In Proceedings of ES-ORICS (2000) 53
    • (2000) Proceedings of ES-ORICS , pp. 53
    • Mantel, H.1
  • 54
    • 8644270771 scopus 로고    scopus 로고
    • An ongoing series published by the Center for High Assurance Computing Systems, Naval research Laboratory, 4555 Overlook Ave, SW, Washington, DC 20375November 1994 – Revised December 1995. Available at
    • McHugh, J.: Covert Channel Analysis. A chapter in the Handbook for the Computer Security Certification of Trusted Systems, (An ongoing series published by the Center for High Assurance Computing Systems, Naval research Laboratory, 4555 Overlook Ave, SW, Washington, DC 20375,) November 1994 – Revised December 1995. Available at http://chacs.nrl.navy.mil/publications/handbook/index.html11
    • Covert Channel Analysis. a Chapter in the Handbook for the Computer Security Certification of Trusted Systems
    • McHugh, J.1
  • 56
    • 0000921963 scopus 로고    scopus 로고
    • Refinement-oriented probability for CSP
    • McIver, A. et al: Refinement-oriented probability for CSP, Formal Aspects of Computing 8(9) (1996)
    • (1996) Formal Aspects of Computing , vol.8 , Issue.9
    • McIver, A.1
  • 58
    • 0022012611 scopus 로고
    • A Comment on the ’Basic Security Theorem’ of Bell and LaPadula
    • McLean, J.: A Comment on the ’Basic Security Theorem’ of Bell and LaPadula, Information Processing Letters, vol. 20, no. 2, Feb. (1985) 11
    • (1985) Information Processing Letters , vol.20 , Issue.2 , pp. 11
    • McLean, J.1
  • 59
    • 0028058408 scopus 로고
    • A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions
    • IEEE Press
    • McLean, J.: A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions, Proceedings of 1994 IEEE Symposium on Research in Security and Privacy, IEEE Press, (1994) 16, 29
    • (1994) Proceedings of 1994 IEEE Symposium on Research in Security and Privacy , vol.16 , pp. 29
    • McLean, J.1
  • 70
    • 0003960349 scopus 로고
    • A Timed Model for Communicating Sequential Processes
    • Reed, M. and Roscoe, A. W.: A Timed Model for Communicating Sequential Processes. In proceedings of the 13th ICALP, LNCS 226, (1986) 17
    • (1986) Proceedings of the 13Th ICALP, LNCS , vol.226 , pp. 17
    • Reed, M.1    Roscoe, A.W.2
  • 71
    • 0001868056 scopus 로고
    • Non-interference through determinism
    • Roscoe, A. W. et al: Non-interference through determinism, Proceedings of ES-ORICS (1994) 40
    • (1994) Proceedings of ES-ORICS , pp. 40
    • Roscoe, A.W.1
  • 77
    • 0035067847 scopus 로고    scopus 로고
    • Process Algebra and Non-interference
    • Ryan, P. Y. A. and Schneider, S. A.: Process Algebra and Non-interference, JCS Vol 9, nos 1,2, (2001) 75-103 45
    • (2001) JCS , vol.9 , Issue.1-2 , pp. 75-103
    • Ryan, P.Y.A.1    Schneider, S.A.2
  • 79
    • 0033700286 scopus 로고    scopus 로고
    • Probabilistic Non-interference for Multi-threaded Programs
    • Cambridge, July 3-5 2000, IEEE Computer Society
    • Sabelfeld, A. and Sands, D.: Probabilistic Non-interference for Multi-threaded Programs. In Proceedings of the IEEE Computer Security Foundations Workshop, Cambridge, July 3-5 2000, IEEE Computer Society, (2000) 200-215 53
    • (2000) Proceedings of the IEEE Computer Security Foundations Workshop , pp. 200-215
    • Sabelfeld, A.1    Sands, D.2
  • 83
    • 85045342620 scopus 로고    scopus 로고
    • Royal Holloway, University of London Tech Report tr-99-02
    • Schneider, S. A.: Testing and abstraction, Royal Holloway, University of London Tech Report tr-99-02 (1999) 46
    • (1999) Testing and Abstraction , pp. 46
    • Schneider, S.A.1
  • 86
    • 6444224063 scopus 로고
    • Implementing the Clark Wilson Integrity Policy Using Current Technology
    • Shockley, W. R.: Implementing the Clark Wilson Integrity Policy Using Current Technology, in Proceedings of the National Security Conference, (1988) 29-36 10
    • (1988) Proceedings of the National Security Conference , pp. 29-36
    • Shockley, W.R.1
  • 89
    • 85045346828 scopus 로고
    • Specifications for Fault Tolerance
    • Weber, D.: Specifications for Fault Tolerance. ORA report (1988) 19-3 50
    • (1988) ORA Report , pp. 50
    • Weber, D.1
  • 91
    • 0033330060 scopus 로고    scopus 로고
    • Probablilistic non-interference in a concurrent language
    • Volpano, D and Smith G.: Probablilistic non-interference in a concurrent language. Journal of Computer Security, 7(2, 3): November (1999) 231-253 56
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 231-253
    • Volpano, D.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.