-
2
-
-
48649094072
-
Information flow control in a parallel language framework
-
J. Banâtre C. Bryce Information flow control in a parallel language framework Proceedings 6th IEEE Computer Security Foundations Workshop 39 52 Proceedings 6th IEEE Computer Security Foundations Workshop 1993-June
-
(1993)
, pp. 39-52
-
-
Banâtre, J.1
Bryce, C.2
-
3
-
-
0003421261
-
An Introduction to Probability Theory and Its Applications
-
third John Wiley & Sons, Inc.
-
W. Feller An Introduction to Probability Theory and Its Applications third I 1968 John Wiley & Sons, Inc.
-
(1968)
, vol.I
-
-
Feller, W.1
-
4
-
-
84974776068
-
A classification of security properties for process algebras
-
R. Focardi R. Gorrieri A classification of security properties for process algebras Journal of Computer Security 3 1 5 33 1994/1995
-
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
5
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
R. Focardi R. Gorrieri The compositional security checker: A tool for the verification of information flow security properties IEEE Transactions on Software Engineering 23 9 550 571 1997
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
6
-
-
0025019906
-
Probabilistic interference
-
CA
-
J. W. Gray Probabilistic interference Proceedings 1990 IEEE Symposium on Security and Privacy 170 179 Proceedings 1990 IEEE Symposium on Security and Privacy Oakland CA 1990-May
-
(1990)
, pp. 170-179
-
-
Gray, J.W.1
-
7
-
-
0026157130
-
Toward a mathematical foundation for information flow security
-
CA
-
J. W. Gray Toward a mathematical foundation for information flow security Proceedings 1991 IEEE Symposium on Security and Privacy 21 34 Proceedings 1991 IEEE Symposium on Security and Privacy Oakland CA 1991-May
-
(1991)
, pp. 21-34
-
-
Gray, J.W.1
-
8
-
-
0031701347
-
The SLam Calculus: Programming with secrecy and integrity
-
CA
-
N. Heintze J. Riecke The SLam Calculus: Programming with secrecy and integrity Proceedings 25th Symposium on Principles of Programming Languages 365 377 Proceedings 25th Symposium on Principles of Programming Languages San Diego CA 1998-Jan.
-
(1998)
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.2
-
9
-
-
0141890488
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems
-
P. Kocher Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems Proceedings 16th Annual Crypto Conference Proceedings 16th Annual Crypto Conference 1996-Aug.
-
(1996)
-
-
Kocher, P.1
-
11
-
-
0025139568
-
Security models and information flow
-
CA
-
J. McLean Security models and information flow Proceedings 1990 IEEE Symposium on Security and Privacy 180 187 Proceedings 1990 IEEE Symposium on Security and Privacy Oakland CA 1990
-
(1990)
, pp. 180-187
-
-
McLean, J.1
-
12
-
-
0004195071
-
Encyclopedia of Software Engineering
-
Security models Wiley Press
-
J. McLean Encyclopedia of Software Engineering 1994 Wiley Press Security models
-
(1994)
-
-
McLean, J.1
-
13
-
-
67650521015
-
Protection against covert storage and timing channels
-
P. Melliar-Smith L. Moser Protection against covert storage and timing channels Proceedings 4th IEEE Computer Security Foundations Workshop 209 214 Proceedings 4th IEEE Computer Security Foundations Workshop 1991-June
-
(1991)
, pp. 209-214
-
-
Melliar-Smith, P.1
Moser, L.2
-
14
-
-
0013162780
-
Semantics with Applications, A Formal Introduction
-
Wiley
-
H. R. Nielson F. Nielson Semantics with Applications, A Formal Introduction 1992 Wiley
-
(1992)
-
-
Nielson, H.R.1
Nielson, F.2
-
15
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
CA
-
G. Smith D. Volpano Secure information flow in a multi-threaded imperative language Proceedings 25th Symposium on Principles of Programming Languages 355 364 Proceedings 25th Symposium on Principles of Programming Languages San Diego CA 1998-Jan.
-
(1998)
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
16
-
-
85058413942
-
Eliminating covert flows with minimum typings
-
D. Volpano G. Smith Eliminating covert flows with minimum typings Proceedings 10th IEEE Computer Security Foundations Workshop 156 168 Proceedings 10th IEEE Computer Security Foundations Workshop 1997-June
-
(1997)
, pp. 156-168
-
-
Volpano, D.1
Smith, G.2
-
18
-
-
0025135716
-
Information flow in nondeterministic systems
-
CA
-
J. T. Wittbold D. M. Johnson Information flow in nondeterministic systems Proceedings 1990 IEEE Symposium on Security and Privacy 144 161 Proceedings 1990 IEEE Symposium on Security and Privacy Oakland CA 1990-May
-
(1990)
, pp. 144-161
-
-
Wittbold, J.T.1
Johnson, D.M.2
|