메뉴 건너뛰기




Volumn 2052, Issue , 2001, Pages 28-38

Composability of secrecy

Author keywords

Composability; Computer aided software engineering; Cryptographic protocols; Formal specification; Modularity; Network security; Refinement; Secrecy

Indexed keywords

COMPUTER AIDED SOFTWARE ENGINEERING; CRYPTOGRAPHY; FORMAL SPECIFICATION; NETWORK ARCHITECTURE; NETWORK PROTOCOLS;

EID: 84955617577     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45116-1_6     Document Type: Conference Paper
Times cited : (7)

References (25)
  • 1
    • 0002652530 scopus 로고    scopus 로고
    • Security protocols and their properties
    • Bauer, F. and Stein- brueggen, R., (eds.), IOS Press
    • Abadi, M.: Security protocols and their properties. In: Bauer, F. and Stein- brueggen, R., (eds.): Foundations of Secure Computation. IOS Press, 2000
    • (2000) Foundations of Secure Computation
    • Abadi, M.1
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Abadi, M. and Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70 (January 1999)
    • (1999) Information and Computation , vol.148 January , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 9
    • 84885216103 scopus 로고    scopus 로고
    • Secure information flow for concurrent processes
    • LNCS. Pennsylvania, Springer
    • Jan Jürjens: Secure information flow for concurrent processes. In: CONCUR 2000 (11th International Conference on Concurrency Theory), Vol. 1877 of LNCS. Pennsylvania, Springer (2000) 395-409
    • (2000) CONCUR 2000 (11Th International Conference on Concurrency Theory) , vol.1877 , pp. 395-409
    • Jürjens, J.1
  • 10
    • 84955598532 scopus 로고    scopus 로고
    • Object-oriented modelling of audit security for smart-card payment schemes
    • In: Paradinas, P., (ed.), Paris, (11-13 June, Kluwer
    • Jan Jürjens: Object-oriented modelling of audit security for smart-card payment schemes. In: Paradinas, P., (ed.): IFIP/SEC 2001 - 16th International Conference on Information Security, Paris, (11-13 June 2001) Kluwer
    • (2001) IFIP/SEC 2001 - 16Th International Conference on Information Security
    • Jürjens, J.1
  • 14
    • 0031335394 scopus 로고    scopus 로고
    • Threat scenarios as a means to formally develop secure systems
    • Lotz, V.: Threat scenarios as a means to formally develop secure systems. Journal of Computer Security 5 (1997) 31-67
    • (1997) Journal of Computer Security , vol.5 , pp. 31
    • Lotz, V.1
  • 15
    • 0002426876 scopus 로고    scopus 로고
    • A general theory of composition for a class of”possibilistic” properties
    • McLean, J.: A general theory of composition for a class of”possibilistic” properties.IEEE Transactions on Software Engineering, 22(1):53-67 (1996)
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 53-67
    • McLean, J.1
  • 16
    • 0026850058 scopus 로고
    • Using traces based on procedure calls to reason about composability
    • Meadows, C.: Using traces based on procedure calls to reason about composability. In: IEEE Symposium on Security and Privacy. (1992)
    • (1992) IEEE Symposium on Security and Privacy
    • Meadows, C.1
  • 17
    • 84955619209 scopus 로고
    • Applying the dependability paradigm to computer security
    • Meadows, C.: Applying the dependability paradigm to computer security. In: New Security Paradigms Workshop. (1995)
    • (1995) New Security Paradigms Workshop
    • Meadows, C.1
  • 18
    • 0001566477 scopus 로고    scopus 로고
    • Formal verification of cryptographic protocols: A survey
    • Meadows, C.: Formal verification of cryptographic protocols: A survey. In: Asiacrypt 96. (1996)
    • (1996) Asiacrypt 96
    • Meadows, C.1
  • 19
    • 84961720022 scopus 로고    scopus 로고
    • Open issues in formal methods for cryptographic protocol analysis
    • Meadows, C.: Open issues in formal methods for cryptographic protocol analysis. In: DISCEX. IEEE (2000)
    • (2000) DISCEX. IEEE
    • Meadows, C.1
  • 24
    • 0033719707 scopus 로고    scopus 로고
    • Secure composition of untrusted code: Wrappers and causality types
    • Sewell, P. and Vitek, J.: Secure composition of untrusted code: Wrappers and causality types. In: CSFW. (2000)
    • (2000) CSFW
    • Sewell, P.1    Vitek, J.2
  • 25
    • 84955587319 scopus 로고
    • Hook-up property for information flow secure nets
    • Varadharajan, V.: Hook-up property for information flow secure nets. In: CSFW. (1991)
    • (1991) CSFW
    • Varadharajan, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.