메뉴 건너뛰기




Volumn 1998-June, Issue , 1998, Pages 105-116

Secure implementation of channel abstractions

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; CALCULATIONS; COMPUTER CIRCUITS; COMPUTER PROGRAMMING LANGUAGES; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; NETWORK SECURITY; PROGRAM TRANSLATORS; TRANSLATION (LANGUAGES);

EID: 84982909952     PISSN: 10436871     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LICS.1998.705647     Document Type: Conference Paper
Times cited : (38)

References (35)
  • 1
    • 84957668700 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • volume 1281 of Lecture Notes in Computer Science, Springer-Verlag
    • M. Abadi. Secrecy by typing in security protocols. In Theoretical Aspects of Computer Software, volume 1281 of Lecture Notes in Computer Science, pages 611{ 638. Springer-Verlag, 1997.
    • (1997) Theoretical Aspects of Computer Software , pp. 611-638
    • Abadi, M.1
  • 4
    • 0003761061 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Jan. Extended version of both [5] and [6]. A revised version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998, and an abridged version will appear in Information and Computation
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Technical Report 414, University of Cambridge Computer Laboratory, Jan. 1997. Extended version of both [5] and [6]. A revised version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998, and an abridged version will appear in Information and Computation.
    • (1997) Technical Report 414, University of Cambridge Computer Laboratory
    • Abadi, M.1    Gordon, A.D.2
  • 6
    • 84957872542 scopus 로고    scopus 로고
    • Reasoning about cryptographic protocols in the spi calculus
    • A. Mazurkiewicz and J. Winkowski, editors, volume 1243 of Lecture Notes in Computer Science, Springer-Verlag, July
    • M. Abadi and A. D. Gordon. Reasoning about cryptographic protocols in the spi calculus. In A. Mazurkiewicz and J. Winkowski, editors, Proceedings of the 8th International Conference on Concurrency Theory, volume 1243 of Lecture Notes in Computer Science, pages 59{73. Springer-Verlag, July 1997.
    • (1997) Proceedings of the 8th International Conference on Concurrency Theory , pp. 59-73
    • Abadi, M.1    Gordon, A.D.2
  • 7
    • 0031332010 scopus 로고    scopus 로고
    • The AltaVista tunnel: Using the Internet to extend corporate networks
    • Oct. On the Web at
    • K. F. Alden and E. P. Wobber. The AltaVista tunnel: Using the Internet to extend corporate networks. Digital Technical Journal, 9(2):5{15, Oct. 1997. On the Web at http://www.digital.com/info/DTJQ01/DTJQ01HM.HTM.
    • (1997) Digital Technical Journal , vol.9 , Issue.2 , pp. 5-15
    • Alden, K.F.1    Wobber, E.P.2
  • 9
    • 0022015288 scopus 로고
    • Secure communication using remote procedure calls
    • Feb
    • A. D. Birrell. Secure communication using remote procedure calls. ACM Transactions on Computer Systems, 3(1):1{14, Feb. 1985.
    • (1985) ACM Transactions on Computer Systems , vol.3 , Issue.1 , pp. 1-14
    • Birrell, A.D.1
  • 13
    • 85043700514 scopus 로고    scopus 로고
    • Proving trust in systems of second-order processes: Preliminary results
    • M. Dam. Proving trust in systems of second-order processes: Preliminary results. Draft, 1997.
    • (1997) Draft
    • Dam, M.1
  • 15
    • 0029703268 scopus 로고    scopus 로고
    • The reflexive chemical abstract machine and the join-calculus
    • ACM, Jan
    • C. Fournet and G. Gonthier. The reflexive chemical abstract machine and the join-calculus. In Proceedings of POPL '96, pages 372{385. ACM, Jan. 1996.
    • (1996) Proceedings of POPL '96 , pp. 372-385
    • Fournet, C.1    Gonthier, G.2
  • 17
    • 84957891695 scopus 로고    scopus 로고
    • Implicit typing a la ML for the join-calculus
    • A. Mazurkiewicz and J. Winkowski, editors, volume 1243 of Lecture Notes in Computer Science, Springer-Verlag, July
    • C. Fournet, C. Laneve, L. Maranget, and D. Remy. Implicit typing a la ML for the join-calculus. In A. Mazurkiewicz and J. Winkowski, editors, Proceedings of the 8th International Conference on Concurrency Theory, volume 1243 of Lecture Notes in Computer Science, pages 196{212. Springer-Verlag, July 1997.
    • (1997) Proceedings of the 8th International Conference on Concurrency Theory , pp. 196-212
    • Fournet, C.1    Laneve, C.2    Maranget, L.3    Remy, D.4
  • 19
    • 0015482118 scopus 로고
    • Proof of correctness of data representations
    • C. A. R. Hoare. Proof of correctness of data representations. Acta Inf., 1:271{281, 1972.
    • (1972) Acta Inf. , vol.1 , pp. 271-281
    • Hoare, C.A.R.1
  • 20
    • 0029404929 scopus 로고
    • On reduction-based process semantics
    • K. Honda and N. Yoshida. On reduction-based process semantics. Theoretical Comput. Sci., 151:437{486, 1995.
    • (1995) Theoretical Comput. Sci. , vol.151 , pp. 437-486
    • Honda, K.1    Yoshida, N.2
  • 23
    • 0028468205 scopus 로고
    • Generic interface to security services
    • July
    • J. Linn. Generic interface to security services. Computer Communications, 17(7):476{482, July 1994.
    • (1994) Computer Communications , vol.17 , Issue.7 , pp. 476-482
    • Linn, J.1
  • 24
    • 0012735033 scopus 로고    scopus 로고
    • A socket-based key management API (and surrounding infrastructure)
    • On the Web at
    • D. L. McDonald, B. G. Phan, and R. J. Atkinson. A socket-based key management API (and surrounding infrastructure). In Proceedings of INET96, 1996. On the Web at http://www.isoc.org/isoc/whatis/conferences/inet/96/proceedings/.
    • (1996) Proceedings of INET96
    • McDonald, D.L.1    Phan, B.G.2    Atkinson, R.J.3
  • 26
    • 85043701681 scopus 로고    scopus 로고
    • Microsoft. Web pages at
    • Microsoft. CryptoAPI. Web pages at http://www.microsoft.com/security/tech/.
    • CryptoAPI
  • 29
    • 0000511698 scopus 로고
    • The polyadic π-calculus: A tutorial
    • Bauer, Brauer, and Schwichtenberg, editors, Springer-Verlag
    • R. Milner. The polyadic π-calculus: A tutorial. In Bauer, Brauer, and Schwichtenberg, editors, Logic and Algebra of Specification. Springer-Verlag, 1993.
    • (1993) Logic and Algebra of Specification
    • Milner, R.1
  • 30
    • 44049113210 scopus 로고
    • A calculus of mobile processes, parts I and II
    • and 41{77, Sept
    • R. Milner, J. Parrow, and D.Walker. A calculus of mobile processes, parts I and II. Information and Computation, 100:1{40 and 41{77, Sept. 1992.
    • (1992) Information and Computation , vol.100 , pp. 1-40
    • Milner, R.1    Parrow, J.2    Walker, D.3
  • 31
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Dec
    • R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993{999, Dec. 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 32
    • 84955567248 scopus 로고
    • The problem of weak bisimulation up to
    • W. R. Cleaveland, editor, volume 630 of Lecture Notes in Computer Science, Springer-Verlag
    • D. Sangiorgi and R. Milner. The problem of "weak bisimulation up to". In W. R. Cleaveland, editor, Proceedings of CONCUR'92, volume 630 of Lecture Notes in Computer Science, pages 32{46. Springer-Verlag, 1992.
    • (1992) Proceedings of CONCUR'92 , pp. 32-46
    • Sangiorgi, D.1    Milner, R.2
  • 33
    • 0012731605 scopus 로고    scopus 로고
    • Sun Microsystems, Inc. Web pages at
    • Sun Microsystems, Inc. RMI enhancements. Web pages at http://java.sun.com/products/jdk/1.2/docs/guide/rmi/index.html 1997.
    • (1997) RMI Enhancements
  • 35
    • 0001259536 scopus 로고    scopus 로고
    • A distributed object model for the Java system
    • Fall
    • A. Wollrath, R. Riggs, and J. Waldo. A distributed object model for the Java system. Computing Systems, 9(4):265{290, Fall 1996.
    • (1996) Computing Systems , vol.9 , Issue.4 , pp. 265-290
    • Wollrath, A.1    Riggs, R.2    Waldo, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.