메뉴 건너뛰기




Volumn 1694, Issue , 1999, Pages 303-311

Safety versus secrecy: Invited paper

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84957709924     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48294-6_20     Document Type: Conference Paper
Times cited : (44)

References (10)
  • 2
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • R. Focardi and R. Gorrieri. A classification of security properties for process algebras. Journal of Computer Security, 3(1):5-33, 1994/1995.
    • (1994) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 5
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • Oakland, CA, May
    • John McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proceedings 1994 IEEE Symposium on Security and Privacy, pages 79-93, Oakland, CA, May 1994.
    • (1994) Proceedings 1994 IEEE Symposium on Security and Privacy , pp. 79-93
    • McLean, J.1
  • 6
    • 84957869855 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • Lecture Notes in Computer Science 1576, March
    • A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. In Proc. 8th European Symposium on Programming. Lecture Notes in Computer Science 1576, March 1999.
    • (1999) Proc. 8th European Symposium on Programming
    • Sabelfeld, A.1    Sands, D.2
  • 7
    • 0003970441 scopus 로고    scopus 로고
    • Technical Report TR98-1664, Cornell University, January
    • F.B. Schneider. Enforceable security policies. Technical Report TR98-1664, Cornell University, January 1998.
    • (1998) Enforceable security policies
    • Schneider, F.B.1
  • 10
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Dennis Volpano, Geoffrey Smith, and Cynthia Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(2,3):167-187, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.2-3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.