메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 140-152

Intransitive non-interference for cryptographic purposes

Author keywords

[No Author keywords available]

Indexed keywords

GRAPH THEORY; NETWORK SECURITY; PROBABILITY;

EID: 84954437845     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2003.1199333     Document Type: Conference Paper
Times cited : (1)

References (32)
  • 1
    • 84937555465 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • Proc. 4th International Conference on Foundations of Software Science and Computation Structures (FOSSACS), Springer
    • M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. In Proc. 4th International Conference on Foundations of Software Science and Computation Structures (FOSSACS), volume 2030 of Lecture Notes in Computer Science, pages 25-41. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2030 , pp. 25-41
    • Abadi, M.1    Blanchet, B.2
  • 2
    • 84957037045 scopus 로고    scopus 로고
    • Computational probabilistic non-interference
    • Proc. 7th European Symposium on Research in Computer Security (ESORICS), Springer
    • M. Backes and B. Pfitzmann. Computational probabilistic non-interference. In Proc. 7th European Symposium on Research in Computer Security (ESORICS), volume 2502 of Lecture Notes in Computer Science, pages 1-23. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2502 , pp. 1-23
    • Backes, M.1    Pfitzmann, B.2
  • 4
    • 84958046259 scopus 로고    scopus 로고
    • A uniform approach to the definition of security properties
    • Proc. 8th Symposium on Formal Methods Europe (FME 1999), Springer
    • R. Focardi and F. Martinelli. A uniform approach to the definition of security properties. In Proc. 8th Symposium on Formal Methods Europe (FME 1999), volume 1708 of Lecture Notes in Computer Science, pages 794-813. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1708 , pp. 794-813
    • Focardi, R.1    Martinelli, F.2
  • 7
    • 84974759639 scopus 로고
    • Toward a mathematical foundation for information flow security
    • J. W. Gray III. Toward a mathematical foundation for information flow security. Journal of Computer Security, 1(3):255-295, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.3 , pp. 255-295
    • Gray, J.W.1
  • 8
  • 11
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. 10th European Symposium on Programming (ESOP), pages 77-91, 2001.
    • (2001) Proc. 10th European Symposium on Programming (ESOP) , pp. 77-91
    • Laud, P.1
  • 12
    • 0004215089 scopus 로고    scopus 로고
    • Morgan Kaufmann Publishers, San Francisco
    • N. Lynch. Distributed Algorithms. Morgan Kaufmann Publishers, San Francisco, 1996.
    • (1996) Distributed Algorithms
    • Lynch, N.1
  • 13
    • 84944059120 scopus 로고    scopus 로고
    • Unwinding possibilistic security properties
    • Proc. 6th European Symposium on Research in Computer Security (ESORICS), Springer
    • H. Mantel. Unwinding possibilistic security properties. In Proc. 6th European Symposium on Research in Computer Security (ESORICS), volume 1895 of Lecture Notes in Computer Science, pages 238-254. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1895 , pp. 238-254
    • Mantel, H.1
  • 14
    • 84881123660 scopus 로고    scopus 로고
    • Information flow control and applications - Bridging a gap
    • Proc. 10th Symposium on Formal Methods Europe (FME 2001), Springer
    • H. Mantel. Information flow control and applications - bridging a gap. In Proc. 10th Symposium on Formal Methods Europe (FME 2001), volume 2021 of Lecture Notes in Computer Science, pages 153-172. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2021 , pp. 153-172
    • Mantel, H.1
  • 15
    • 0023231848 scopus 로고
    • Specifications for multi-level security and a hook-up property
    • D. McCullough. Specifications for multi-level security and a hook-up property. In Proc. 8th IEEE Symposium on Security & Privacy, pages 161-166, 1987.
    • (1987) Proc. 8th IEEE Symposium on Security & Privacy , pp. 161-166
    • McCullough, D.1
  • 21
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184-200, 2001.
    • (2001) Proc. 22nd IEEE Symposium on Security & Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2
  • 25
    • 84944051800 scopus 로고    scopus 로고
    • Verification of a formal security model for multiapplicative smart cards
    • Proc. 6th European Symposium on Research in Computer Security (ESORICS), Springer
    • G. Schellhorn, W. Reif, A. Schairer, P. Karger, V. Austel, and D. Toll. Verification of a formal security model for multiapplicative smart cards. In Proc. 6th European Symposium on Research in Computer Security (ESORICS), volume 1895 of Lecture Notes in Computer Science, pages 17-36. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1895 , pp. 17-36
    • Schellhorn, G.1    Reif, W.2    Schairer, A.3    Karger, P.4    Austel, V.5    Toll, D.6
  • 26
    • 0018545449 scopus 로고
    • How to share a secret
    • Nov
    • A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, Nov. 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.