메뉴 건너뛰기




Volumn 2477, Issue , 2002, Pages 376-394

Static confidentiality enforcement for distributed programs

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; MESSAGE PASSING;

EID: 84958755151     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45789-5_27     Document Type: Conference Paper
Times cited : (66)

References (52)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • September
    • M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, September 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 3
    • 84937555465 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • April
    • M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. In FOSSACS'01, LNCS 2030, pages 25-41, April 2001.
    • (2001) FOSSACS'01, LNCS 2030 , pp. 25-41
    • Abadi, M.1    Blanchet, B.2
  • 5
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (The computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal ofCryptology, 15(2), 2002.
    • (2002) Journal Ofcryptology , vol.15 , Issue.2
    • Abadi, M.1    Rogaway, P.2
  • 12
    • 84879520825 scopus 로고    scopus 로고
    • Noninterference for concurrent programs
    • July
    • G. Boudol and I. Castellani. Noninterference for concurrent programs. In ICALP'01, LNCS 2076, pages 382-395, July 2001.
    • (2001) ICALP'01, LNCS 2076 , pp. 382-395
    • Boudol, G.1    Castellani, I.2
  • 13
    • 84976675687 scopus 로고
    • Information transmission in computational systems
    • E. S. Cohen. Information transmission in computational systems. ACM SIGOPS Operating Systems Review, 11(5):133-139, 1977.
    • (1977) ACM SIGOPS Operating Systems Review , vol.11 , Issue.5 , pp. 133-139
    • Cohen, E.S.1
  • 14
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Academic Press
    • E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 15
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 17
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, July 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 18
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • R. Focardi and R. Gorrieri. A classification of security properties for process algebras. Journal of Computer Security, 3(1):5-33, 1995.
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 23
    • 84974577536 scopus 로고    scopus 로고
    • Information flow vs resource access in the asynchronous pi-calculus (Extended abstract)
    • M. Hennessy and J. Riely. Information flow vs resource access in the asynchronous pi-calculus (extended abstract). In ICALP'00, LNCS 1853, pages 415-427, 2000.
    • (2000) ICALP'00, LNCS 1853 , pp. 415-427
    • Hennessy, M.1    Riely, J.2
  • 27
    • 0015672289 scopus 로고
    • A note on the confinement problem. Commun
    • Oct
    • B. W. Lampson. A note on the confinement problem. Commun. ACM, 16(10):613-615, Oct. 1973.
    • (1973) ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 29
    • 0033751850 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • K. R. M. Leino and R. Joshi. A semantic approach to secure information flow. Science ofComputer Programming, 37(1-3):113-138, 2000.
    • (2000) Science Ofcomputer Programming , vol.37 , Issue.1-3 , pp. 113-138
    • Leino, K.1    Joshi, R.2
  • 33
    • 84872691539 scopus 로고    scopus 로고
    • A unifying approach to the security of distributed and multi-threaded programs
    • To appear
    • H. Mantel and A. Sabelfeld. A unifying approach to the security of distributed and multi-threaded programs. Journal ofComputer Security, 2002. To appear.
    • (2002) Journal Ofcomputer Security
    • Mantel, H.1    Sabelfeld, A.2
  • 34
    • 0023231848 scopus 로고
    • Specifications for multi-level security and hook-up property
    • May
    • D. McCullough. Specifications for multi-level security and hook-up property. In Proc. ofIEEE Symposium on Security and Privacy, pages 161-166. May 1987.
    • (1987) Proc. Ofieee Symposium on Security and Privacy , pp. 161-166
    • McCullough, D.1
  • 35
    • 0025211594 scopus 로고
    • The specification and modeling of computer security
    • January
    • J. McLean. The specification and modeling of computer security. Computer, 23(1), January 1990.
    • (1990) Computer , vol.23 , Issue.1
    • McLean, J.1
  • 36
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proc. ofIEEE Symposium on Security and Privacy, 1994.
    • (1994) Proc. Ofieee Symposium on Security and Privacy
    • McLean, J.1
  • 38
    • 0012781083 scopus 로고
    • Information flow control in a distributed object-oriented system with statically-bound object variables
    • M. Mizuno and A. Oldehoeft. Information flow control in a distributed object-oriented system with statically-bound object variables. In Proc. ofNational Computer Security Conference, pages 56-67, 1987.
    • (1987) Proc. Ofnational Computer Security Conference , pp. 56-67
    • Mizuno, M.1    Oldehoeft, A.2
  • 39
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. of IEEE Symposium on Security and Privacy, pages 184-200, 2001.
    • (2001) Proc. of IEEE Symposium on Security and Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2
  • 45
    • 0035276729 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher-Order and Symbolic Computation, 14(1):59-91, 2001.
    • (2001) Higher-Order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 49
    • 0033330060 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language
    • November
    • D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. Journal ofComputer Security, 7(23):231-253, November 1999.
    • (1999) Journal Ofcomputer Security , vol.7 , Issue.23 , pp. 231-253
    • Volpano, D.1    Smith, G.2
  • 50


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.