自动化技术、计算机技术 |
|
|
|
|
多线程程序的信息抹除和降密安全策略 |
姜励, 陈健, 平玲娣, 陈小平 |
浙江大学 计算机科学与技术学院,浙江 杭州 310027 |
|
Security policy for information erasing and leaking in
multithreaded codes |
JIANG Li, CHEN Jian, PING Ling-di, CHEN Xiao-ping |
College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China |
引用本文:
姜励, 陈健, 平玲娣, 陈小平. 多线程程序的信息抹除和降密安全策略[J]. J4, 2010, 44(5): 854-862.
JIANG Li, CHEN Jian, BENG Ling-Di, CHEN Xiao-Beng. Security policy for information erasing and leaking in
multithreaded codes. J4, 2010, 44(5): 854-862.
链接本文:
http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2010.05.004
或
http://www.zjujournals.com/eng/CN/Y2010/V44/I5/854
|
[1] FOCARDI R, GORRIERI R. A classification of security properties for process algebras [J]. Journal of Computer Security, 1995, 3(1): 533.
[2] VOLPANO D, SMITH G, IRVINE C. A sound type system for secure flow analysis [J]. Journal of Computer Security, 1996, 4(3): 167187.
[3] SABELFELD A, MYERS A C. Languagebased informationflow security [J]. IEEE Journal on Selected Areas in Communications, 2003, 21(1): 519.
[4] GOGUEN J A, MESEGUER J. Security policies and security models [C]∥ Proceedings of the 1982 IEEE Symposium on Research in Security and Privacy. Oakland: IEEE, 1982: 1120.
[5] SABELFELD A, SANDS D. Dimensions and principles of declassification [C]∥ Proceedings of the 18th IEEE Computer Security Foundations Workshop. AixenProvence: IEEE, 2005: 255269.
[6] MYERS A C, SABELFELD A, ZDANCEWIC S. Enforcing robust declassification [C]∥ Proceedings of the 17th IEEE Computer Security Foundations Workshop. Pacific Grove: IEEE, 2004: 172186.
[7] SABELFELD A, MYERS A C. A model for delimited information release [C]∥ Proceedings of the International Symposium on Software Security 2003 (ISSS’03). Berlin: SpringerVerlag, 2004: 174191.
[8] ROSCOE A W, GOLDSMITH M H. What is intransitive noninterference [C]∥ Proceedings of the 12th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE, 1999: 228238.
[9] CHONG S, MYERS A C. Security policies for downgrading[C]∥ Proceeding of 11th ACM Conference on Computer and Communications Security. Washington DC: ACM, 2004: 198209.
[10] CHONG S, MYERS A C. Languagebased information erasure[C]∥ Proceedings of the 18th IEEE Computer Security Foundations Workshop. AixenProvence: IEEE, 2005: 241254.
[11] MANTEL H, REINHARD A. Controlling the what and where of declassification in languagebased security[C]∥ Proceedings of the European Symposium on Programming 2007 (ESOP’07). Berlin: SpringerVerlag, 2007: 141156.
[12] SABELFELD A, SANDS D. Probabilistic noninterference for multithreaded programs[C]∥ Proceedings of IEEE Computer Security Foundations Workshop. Cambridge: IEEE, 2000: 200215.
[13] JOHAN A. Transforming out timing leaks [C]∥ Proceedings of the 27th ACM SIGPLANSIGACT Symposium on Principles of Programming Languages. Washington DC: ACM, 2000: 4053. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|