메뉴 건너뛰기




Volumn 3, Issue 1, 1995, Pages 5-33

A classification of security properties for process algebras1

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84974776068     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-1994/1995-3103     Document Type: Article
Times cited : (264)

References (32)
  • 3
    • 84974754345 scopus 로고
    • A Logical View of Secure Dependencies
    • P. Bieber and F. Cuppens. “A Logical View of Secure Dependencies”. Journal of Computer Security, 1 (1):99-129, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 99-129
    • Bieber, P.1    Cuppens, F.2
  • 5
    • 0027342054 scopus 로고
    • The Concurrency Workbench: A Semantics Based Tool for the Verification of Concurrent Systems. ACM Transactions on Programming Languages and Systems
    • R. Cleaveland, J. Parrow, and B. Steffen. “The Concurrency Workbench: A Semantics Based Tool for the Verification of Concurrent Systems”. ACM Transactions on Programming Languages and Systems, Vol. 15 No, 1:36-72, January 1993.
    • (1993) , vol.15 , pp. 36-72
    • Cleaveland, R.1    Parrow, J.2    Steffen, B.3
  • 14
    • 0004189966 scopus 로고
    • Algebraic Theory of Processes
    • M. Hennessy. Algebraic Theory of Processes. The MIT Press, 1988
    • (1988) The MIT Press
    • Hennessy, M.1
  • 15
    • 55849123912 scopus 로고
    • Communicating Sequential Processes
    • C. A. R. Hoare. Communicating Sequential Processes. Prentice-Hall, 1985.
    • (1985) Prentice-Hall
    • Hoare, C.A.R.1
  • 16
    • 84974759639 scopus 로고
    • HI. “Toward a Mathematical Foundation for Information Flow Security
    • J. W. Gray HI. “Toward a Mathematical Foundation for Information Flow Security”. Journal of Computer 5ec«rtfy, 1:255-294, 1992.
    • (1992) Journal of Computer 5ec«rtfy , vol.1 , pp. 255-294
    • Gray, J.W.1
  • 18
    • 0016972709 scopus 로고
    • Formal Verification of Parallel Programs
    • R. Keller. “Formal Verification of Parallel Programs”. Communications of the ACM, 19 (7):561-572, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.7 , pp. 561-572
    • Keller, R.1
  • 21
    • 0023829319 scopus 로고
    • Noninterference and the Composability of Security Properties
    • Proceedings, 1988, IEEE Computer Society Press, April
    • D. McCullough. “Noninterference and the Composability of Security Properties”. In Proceedings, 1988 IEEE Symposium on -Security and Privacy, pages 177-186. IEEE Computer Society Press, April 1988.
    • (1988) IEEE Symposium on -Security and Privacy , pp. 177-186
    • McCullough, D.1
  • 24
    • 0028058408 scopus 로고
    • A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions
    • Proceeding of the 1994, IEEE Computer Society Press
    • J. McLean. “A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions”, In Proceeding of the 1994 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, 1994.
    • (1994) IEEE Symposium on Research in Security and Privacy
    • McLean, J.1
  • 25
    • 0025686008 scopus 로고
    • Hookup Security for Synchronous Machines
    • Proceedings of the Third Computer Security Foundation Workshop III
    • J. K. Millen. “Hookup Security for Synchronous Machines”. In Proceedings of the Third Computer Security Foundation Workshop III. IEEE Computer Society Press, 1990.
    • (1990) IEEE Computer Society Press
    • Millen, J.K.1
  • 26
    • 18944381228 scopus 로고
    • Communication and Concurrency
    • R. Milner. Communication and Concurrency. Prentice-Hall, 1989.
    • (1989) Prentice-Hall
    • Milner, R.1
  • 28
    • 0005314068 scopus 로고
    • Integrity in Automated Information Systems
    • National Computer Security Center, September
    • Department of Defense. “Integrity in Automated Information Systems”. Technical Report C 79-91, National Computer Security Center, September 1991.
    • (1991) Technical Report C , pp. 79-91
  • 31
    • 0038118932 scopus 로고
    • A Model of Information
    • National Bureau of Standards and National Computer Security Center, September
    • D. Sutherland. “A Model of Information”. In Proceedings of the 9th National Computer Security Conference, pages 175-183. National Bureau of Standards and National Computer Security Center, September 1986.
    • (1986) Proceedings of the 9Th National Computer Security Conference , pp. 175-183
    • Sutherland, D.1
  • 32
    • 0025135716 scopus 로고
    • Information Flow in Nondeterministic Systems
    • Proceedings of the 1990, IEEE Computer Society Press
    • J. T. Wittbold and D. M. Johnson. “Information Flow in Nondeterministic Systems”. In Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pages 144-161. IEEE Computer Society Press, 1990.
    • (1990) IEEE Symposium on Research in Security and Privacy , pp. 144-161
    • Wittbold, J.T.1    Johnson, D.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.