PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Network Information Flow

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
A formal model for an analysis of an information flow in interconnection networks is presented. It is based on timed process algebra which can express also network properties. The information flow is based on a concept of deducibility on composition. Robustness of systems against network timing attacks is defined. A variety of different security properties which reflect different security requirements are defined and investigated.
Wydawca
Rocznik
Strony
167--180
Opis fizyczny
bibliogr. 12 poz.
Twórcy
autor
  • Institute of Informatics Comenius University Bratislava, Mlunska dolina, 842-48 Bratislava, Slovakia, gruska@fmph.uniba.sk
Bibliografia
  • [BMPR05] Bossi A., D. Macedonio, C. Piazza and S. Rossi. Information Flow in Secure Contexts. Journal of Computer Security, 13(3), 391-422, IOS Press, 2005.
  • [BFPR03] Bossi A., R. Focardi, C. Piazza and S. Rossi. Refinement Operators and Information Flow Security. Proc. of SEFM'03, IEEE Computer Society Press, 2003.
  • [DKL98] Dhem J.-F., F. Koeune, P.-A. Leroux, P. Mestre, J.-J. Quisquater and J.-L. Willems. A practical implementation of the timing attack. Proc. of the Third Working Conference on Smart Card Research and Advanced Applications (CARDIS 1998), LNCS 1820, Springer, Berlin, 1998.
  • [FS00] Felten, E.W., and M.A. Schneider: Timing attacks on web privacy. Proc. 7/ 􀀀 ACM Conference on Computer and Communications Security, 25-32, 2000.
  • [FG01] Focardi, R. and R. Gorrieri: Classification of Security Properties. Part I: Information Flow. Foundations of Security Analysis and Design, LNCS 2171, 331-396, 2001.
  • [FGM00] Focardi, R., R. Gorrieri, and F. Martinelli: Information flow analysis in a discrete-time process algebra. Proc. 13th Computer Security FoundationWorkshop, IEEE Computer Society Press, 2000.
  • [FR02] Focardi, R. and S. Rossi: Information flow security in Dynamic Contexts. Proc. of the IEEE Computer Security FoundationsWorkshop, 307-319, IEEE Computer Society Press, 2002.
  • [GM01] Gruska D.P. and A. Maggiolo-Schettini. Process Algebra for Network Communication, Fundamenta Informaticae, 45(4), 359-378, 2001.
  • [HH99] Handschuh H. and Howard M. Heys: A timing attack on RC5. Proc. Selected Areas in Cryptography, LNCS 1556, Springer, Berlin, 1999, 306-318.
  • [Ko96] Kocher P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems. Proc. Advances in Cryptology - CRYPTO'96, LNCS 1109, Springer, Berlin, 1996, 104-113.
  • [M94] Martinelli, F.: "McTACTL: A Tool to Verify NTiCCS Specifications", Technical Report TR-21/94, Dipartimento di Informatica, Universit`a di Pisa, 1994.
  • [SWT01] Song. D., D. Wagner, and X. Tian: Timing analysis of Keystrokes and SSH timing attacks. In 10th USENIX Security Symposium, 2001.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS2-0010-0061
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.