메뉴 건너뛰기




Volumn 2171 LNCS, Issue , 2001, Pages 331-396

Classification of security properties⋆ (Part I: Information flow)

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; CLASSIFICATION (OF INFORMATION); COMPUTER CONTROL SYSTEMS; SECURITY SYSTEMS;

EID: 84988393004     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45608-2_6     Document Type: Conference Paper
Times cited : (182)

References (64)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by Typing in Security Protocols
    • 331
    • M. Abadi. “Secrecy by Typing in Security Protocols”. Journal of ACM, 46(5):749– 786, 1999. 331
    • (1999) Journal of ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • 331, 392
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1–70, 1999. 331, 392
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 4
    • 84872312669 scopus 로고
    • A Comparison of Non-Interference and Non-Deducibility using CSP
    • Franconia, New Hampshire, 368
    • P. G. Allen. “A Comparison of Non-Interference and Non-Deducibility using CSP”. In Proceedings of the Fourth IEEE Computer Security Foundations Workshop, pages 43–54, Franconia, New Hampshire, June 1991. 368
    • (1991) Proceedings of the Fourth IEEE Computer Security Foundations Workshop , pp. 43-54
    • Allen, P.G.1
  • 6
    • 0021870594 scopus 로고
    • Algebra of Communicating Processes with Ab-straction
    • 356
    • J. A. Bergstra and J. W. Klop. “Algebra of Communicating Processes with Ab-straction”. Theoretical Computer Science, 37:77–121, 1985. 356
    • (1985) Theoretical Computer Science , vol.37 , pp. 77-121
    • Bergstra, J.A.1    Klop, J.W.2
  • 7
    • 84974754345 scopus 로고
    • A Logical View of Secure Dependencies
    • 333
    • P. Bieber and F. Cuppens. “A Logical View of Secure Dependencies”. Journal of Computer Security, 1(1):99–129, 1992. 333
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 99-129
    • Bieber, P.1    Cuppens, F.2
  • 8
    • 0000691413 scopus 로고    scopus 로고
    • Static Analysis of Processes for No Read- Up and No Write- Down
    • Amsterdam, Springer. 331
    • C. Bodei, P. Degano, F. Nielson, and H. Riis Nielson. “Static Analysis of Processes for No Read- Up and No Write- Down”. In proc. of 2nd FoSSaCS’99, Amsterdam, March 1999. Springer. 331
    • (1999) Proc. of 2Nd FoSSaCS’99
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Riis Nielson, H.4
  • 10
    • 0342694716 scopus 로고
    • An Improved Failures Model for Communicating Processes
    • Springer-Verlag, LNCS 197, 370, 375
    • S. D. Brookes and A. W. Roscoe. “An Improved Failures Model for Communicating Processes”. In Proceedings of the Pittsburgh seminar on concurrency, pages 281– 305. Springer-Verlag, LNCS 197, 1985. 370, 375
    • (1985) Proceedings of the Pittsburgh Seminar on Concurrency , pp. 281-305
    • Brookes, S.D.1    Roscoe, A.W.2
  • 13
    • 84947919695 scopus 로고    scopus 로고
    • Mobile Ambients
    • Springer LNCS 1378, 392
    • L. Cardelli and A. Gordon. “Mobile Ambients”. In proceedings of FoSSaCS’98, pages 140–155. Springer LNCS 1378, 1998. 392
    • (1998) Proceedings of FoSSaCS’98 , pp. 140-155
    • Cardelli, L.1    Gordon, A.2
  • 14
    • 0027342054 scopus 로고
    • The Concurrency Workbench: A Semantics Based Tool for the Verification of Concurrent Systems
    • January, 334, 377, 379, 380
    • R. Cleaveland, J. Parrow, and B. Steffen. “The Concurrency Workbench: a Semantics Based Tool for the Verification of Concurrent Systems”. ACM Transactions on Programming Languages and Systems, Vol. 15 No. 1:36–72, January 1993. 334, 377, 379, 380
    • (1993) ACM Transactions on Programming Languages and Systems , vol.15 , Issue.1 , pp. 36-72
    • Cleaveland, R.1    Parrow, J.2    Steffen, B.3
  • 19
  • 24
    • 84974776068 scopus 로고
    • A Classification of Security Properties for Process Algebras
    • 333, 335, 348, 362, 363, 376, 377
    • R. Focardi and R. Gorrieri. “A Classification of Security Properties for Process Algebras”. Journal of Computer Security, 3(1):5–33, 1994/1995. 333, 335, 348, 362, 363, 376, 377
    • (1994) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 26
    • 0001439194 scopus 로고    scopus 로고
    • The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
    • 335, 348, 377
    • R. Focardi and R. Gorrieri. “The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties”. IEEE Transactions on Software Engineering, 23(9):550–571, September 1997. 335, 348, 377
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2
  • 30
    • 0003207615 scopus 로고    scopus 로고
    • Non Interference for the Analysis of Cryptographic Protocols
    • LNCS 1853, 331, 392
    • R. Focardi, R. Gorrieri, and F. Martinelli. “Non Interference for the Analysis of Cryptographic Protocols”. In Proceedings of ICALP’00, pages 744–755. LNCS 1853, July 2000. 331, 392
    • (2000) Proceedings of ICALP’00 , pp. 744-755
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 32
    • 0029485428 scopus 로고
    • The Security Checker: A Semantics-based Tool for the Verification of Security Properties
    • Li Gong, Kenmare (Ireland), IEEE Press. 377
    • R. Focardi, R. Gorrieri, and V. Panini. “The Security Checker: a Semantics-based Tool for the Verification of Security Properties”. In Proceedings Eight IEEE Computer Security Foundation Workshop, (CSFW’95) (Li Gong Ed.), pages 60– 69, Kenmare (Ireland), June 1995. IEEE Press. 377
    • (1995) Proceedings Eight IEEE Computer Security Foundation Workshop, (CSFW’95) , pp. 60-69
    • Focardi, R.1    Gorrieri, R.2    Panini, V.3
  • 37
    • 84974577536 scopus 로고    scopus 로고
    • Information Flow vs. Resource Access in the Asynchronous Pi-Calculus
    • 392
    • M. Hennessy and J. Riely. “Information Flow vs. Resource Access in the Asynchronous Pi-Calculus”. In proceedings of ICALP, pages 415–427, 2000. 392
    • (2000) Proceedings of ICALP , pp. 415-427
    • Hennessy, M.1    Riely, J.2
  • 42
    • 0025432462 scopus 로고
    • CCS Expressions, Finite State Processes, and Three Problems of Equivalence
    • 355, 380, 381
    • P. Kanellakis and S. A. Smolka. “CCS Expressions, Finite State Processes, and Three Problems of Equivalence”. Information & Computation 86, pages 43–68, May 1990. 355, 380, 381
    • (1990) Information & Computation , vol.86 , pp. 43-68
    • Kanellakis, P.1    Smolka, S.A.2
  • 43
    • 0016972709 scopus 로고
    • Formal Verification of Parallel Programs
    • 333
    • R. Keller. “Formal Verification of Parallel Programs”. Communications of the ACM, 19 (7):561–572, 1976. 333
    • (1976) Communications of the ACM , vol.19 , Issue.7 , pp. 561-572
    • Keller, R.1
  • 44
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A Compiler for the Analysis of Security Protocols”
    • 331
    • G. Lowe. “Casper: A Compiler for the Analysis of Security Protocols”. Journal of Computer Security, 6:53–84, 1998. 331
    • (1998) Journal of Computer Security , vol.6 , pp. 53-84
    • Lowe, G.1
  • 45
    • 35848959071 scopus 로고    scopus 로고
    • Using CSP to detect Errors in the TMN Protocol
    • 331
    • G. Lowe and B. Roscoe. “Using CSP to detect Errors in the TMN Protocol”. IEEE Transactions on Software Engineering, 23(10):659–669, 1997. 331
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.10 , pp. 659-669
    • Lowe, G.1    Roscoe, B.2
  • 48
    • 0023829319 scopus 로고
    • Noninterference and the Composability of Security Properties
    • IEEE Computer Society Press, 333, 376
    • D. McCullough. “Noninterference and the Composability of Security Properties”. In Proceedings, 1988 IEEE Symposium on Security and Privacy, pages 177–186. IEEE Computer Society Press, April 1988. 333, 376
    • (1988) Proceedings, 1988 IEEE Symposium on Security and Privacy , pp. 177-186
    • McCullough, D.1
  • 50
    • 0003954103 scopus 로고
    • Prentice-Hall, 333, 335, 337, 339, 340, 343, 344, 361, 363, 364
    • R. Milner. Communication and Concurrency. Prentice-Hall, 1989. 333, 335, 337, 339, 340, 343, 344, 361, 363, 364
    • (1989) Communication and Concurrency
    • Milner, R.1
  • 52
    • 0020845493 scopus 로고
    • Testing equivalences for processes
    • 341, 348, 353
    • R. De Nicola and M. Hennessy. “Testing equivalences for processes”. Theoretical Computer Science, 34:83–133, 1984. 341, 348, 353
    • (1984) Theoretical Computer Science , vol.34 , pp. 83-133
    • de Nicola, R.1    Hennessy, M.2
  • 53
    • 0030705795 scopus 로고    scopus 로고
    • Proving Properties of Security Protocols by Induction
    • IEEE Computer Society Press, 331
    • L. C. Paulson. “Proving Properties of Security Protocols by Induction”. In 10th Computer Security Foundations Workshop, pages 70–83. IEEE Computer Society Press, 1997. 331
    • (1997) 10Th Computer Security Foundations Workshop , pp. 70-83
    • Paulson, L.C.1
  • 55
    • 0001789630 scopus 로고
    • Model Checking CSP
    • A. W. Roscoe, Prentice Hall, 368, 375
    • A. W. Roscoe. “Model Checking CSP”. In A. W. Roscoe (ed) A Classical Mind. Prentice Hall, 1994. 368, 375
    • (1994) A Classical Mind
    • Roscoe, A.W.1
  • 60
    • 0031648455 scopus 로고    scopus 로고
    • Secure Information Flow in a Multi-Threaded Imperative Language
    • 331
    • G. Smith and D. M. Volpano. “Secure Information Flow in a Multi-Threaded Imperative Language”. In Proc. of POPL, pages 355–364, 1998. 331
    • (1998) Proc. of POPL , pp. 355-364
    • Smith, G.1    Volpano, D.M.2
  • 62
    • 0038118932 scopus 로고
    • A Model of Information
    • National Bureau of Standards and National Computer Security Center, 333, 376
    • D. Sutherland. “A Model of Information”. In Proceedings of the 9th National Computer Security Conference, pages 175–183. National Bureau of Standards and National Computer Security Center, September 1986. 333, 376
    • (1986) Proceedings of the 9Th National Computer Security Conference , pp. 175-183
    • Sutherland, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.