-
1
-
-
0032681509
-
A core calculus of dependency
-
San Antonio, TX, January
-
Martín Abadi, Anindya Banerjee, Nevin Heintze, and Jon Riecke. A core calculus of dependency. In Proc. 26th ACM Symp. on Principles of Programming Languages (POPL), pages 147-160, San Antonio, TX, January 1999.
-
(1999)
Proc. 26th ACM Symp. on Principles of Programming Languages (POPL)
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.4
-
3
-
-
0003400251
-
Secure computer system: Unified exposition and Multics interpretation
-
MITRE Corp. MTR-2997, Bedford, MA, Available as NTIS AD-A023 588
-
D. E. Bell and L. J. LaPadula. Secure computer system: Unified exposition and Multics interpretation. Technical Report ESD-TR-75-306, MITRE Corp. MTR-2997, Bedford, MA, 1975. Available as NTIS AD-A023 588.
-
(1975)
Technical Report ESD-TR-75-306
-
-
Bell, D.E.1
LaPadula, L.J.2
-
4
-
-
0003400255
-
Integrity considerations for secure computer systems
-
USAF Electronic Systems Division, Bedford, MA, April
-
K. J. Biba. Integrity considerations for secure computer systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, April 1977.
-
(1977)
Technical Report ESD-TR-76-372
-
-
Biba, K.J.1
-
5
-
-
0040283808
-
-
Cryptix
-
Cryptix. http://uww.cryptix.org/products/cryptix31/.
-
-
-
-
6
-
-
84957697395
-
On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
-
Jacques Stern, editor, LNCS Springer
-
Ivan Damgård, Joe Kilian, and Louis Salvail. On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In Jacques Stern, editor, Advances in Cryptology - Proceedings of EUROCRYPT 99, LNCS 1592, pages 56-73. Springer, 1999.
-
(1592)
Advances in Cryptology - Proceedings of EUROCRYPT 99
, pp. 56-73
-
-
Damgård, I.1
Kilian, J.2
Salvail, L.3
-
7
-
-
0016949746
-
A lattice model of secure information flow
-
Dorothy E. Denning. A lattice model of secure information flow. Comm. of the ACM, 19(5):236-243, 1976.
-
(1976)
Comm. of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
8
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
Dorothy E. Denning and Peter J. Denning. Certification of Programs for Secure Information Flow. Comm. of the ACM, 20(7):504-513, July 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
10
-
-
0026226515
-
A comparison of two distributed systems: Amoeba and Sprite
-
Fall
-
Fred Douglis, John K. Ousterhout, M. Frans Kaashoek, and Andrew S. Tanenbaum. A comparison of two distributed systems: Amoeba and Sprite. ACM Transactions on Computer Systems, 4(4), Fall 1991.
-
(1991)
ACM Transactions on Computer Systems
, vol.4
, Issue.4
-
-
Douglis, F.1
Ousterhout, J.K.2
Kaashoek, M.F.3
Tanenbaum, A.S.4
-
11
-
-
0020878801
-
A randomized protocol for signing contracts
-
R.L. Rivest, A. Sherman, and D. Chaum, editors, Plenum Press
-
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. In R.L. Rivest, A. Sherman, and D. Chaum, editors, Advances in Cryptology: Proc. of CRYPTO 82, pages 205-210. Plenum Press, 1983.
-
(1983)
Advances in Cryptology: Proc. of CRYPTO 82
, pp. 205-210
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
12
-
-
0003562729
-
A technique for proving specifications are multilevel secure
-
SRI International Computer Science Lab, Menlo Park, California, January
-
Richard J. Feiertag. A technique for proving specifications are multilevel secure. Technical Report CSL-109, SRI International Computer Science Lab, Menlo Park, California, January 1980.
-
(1980)
Technical Report CSL-109
-
-
Feiertag, R.J.1
-
13
-
-
0016382977
-
Memoryless subsystems
-
May
-
J. S. Fenton. Memoryless subsystems. Computing J., 17(2):143-147, May 1974.
-
(1974)
Computing J.
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
18
-
-
0040283805
-
-
Java secure socket extension (JSSE). http://java.sun.com/products/jsse/.
-
-
-
-
19
-
-
0023960862
-
Fine-grained mobility in the Emerald system
-
February
-
E. Jul et al. Fine-grained mobility in the Emerald system. ACM Transactions on Computer Systems, 6(1):109-133, February 1988.
-
(1988)
ACM Transactions on Computer Systems
, vol.6
, Issue.1
, pp. 109-133
-
-
Jul, E.1
-
21
-
-
0004237928
-
-
IR 5691, NIST
-
J. R. Lyle, D. R. Wallace, J. R. Graham, K. B. Gallagher, J. P. Poole, and D. W. Binkley. Unravel: A CASE tool to assist evaluation of high integrity software. IR 5691, NIST, 1995.
-
(1995)
Unravel: A CASE Tool to Assist Evaluation of High Integrity Software
-
-
Lyle, J.R.1
Wallace, D.R.2
Graham, J.R.3
Gallagher, K.B.4
Poole, J.P.5
Binkley, D.W.6
-
22
-
-
0034823079
-
A generic approach to the security of multi-threaded programs
-
IEEE Computer Society Press, June
-
Heiko Mantel and Andrei Sabelfeld. A generic approach to the security of multi-threaded programs. In Proc. of the 14th IEEE Computer Security Foundations Workshop, pages 200-214. IEEE Computer Society Press, June 2001.
-
(2001)
Proc. of the 14th IEEE Computer Security Foundations Workshop
, pp. 200-214
-
-
Mantel, H.1
Sabelfeld, A.2
-
23
-
-
0026910016
-
Multilevel security in the UNIX tradition
-
August
-
M. D. McIlroy and J. A. Reeds. Multilevel security in the UNIX tradition. Software - Practice and Experience, 22(8):673-694, August 1992.
-
(1992)
Software - Practice and Experience
, vol.22
, Issue.8
, pp. 673-694
-
-
McIlroy, M.D.1
Reeds, J.A.2
-
24
-
-
0016951438
-
Security kernel validation in practice
-
May
-
Jonathan K. Millen. Security kernel validation in practice. Comm. of the ACM, 19(5):243-250, May 1976.
-
(1976)
Comm. of the ACM
, vol.19
, Issue.5
, pp. 243-250
-
-
Millen, J.K.1
-
25
-
-
0019669665
-
Information flow analysis of formal specifications
-
April
-
Jonathan K. Millen. Information flow analysis of formal specifications. In Proc. IEEE Symposium on Security and Privacy, pages 3-8, April 1981.
-
(1981)
Proc. IEEE Symposium on Security and Privacy
, pp. 3-8
-
-
Millen, J.K.1
-
26
-
-
0041525084
-
From System F to typed assembly language
-
May
-
Greg Morrisett, David Walker, Karl Crary, and Neal Glew. From System F to typed assembly language. ACM Transactions on Programming Languages and Systems, 21(3):528-569, May 1999.
-
(1999)
ACM Transactions on Programming Languages and Systems
, vol.21
, Issue.3
, pp. 528-569
-
-
Morrisett, G.1
Walker, D.2
Crary, K.3
Glew, N.4
-
32
-
-
0039099864
-
-
Platform for privacy preferences (P3P)
-
Platform for privacy preferences (P3P). http://www.w3.org/p3p.
-
-
-
-
33
-
-
84955596529
-
Trust in the λ-calculus
-
number 983 in Lecture Notes in Computer Science, Springer, September
-
Jens Palsberg and Peter Ørbaek. Trust in the λ-calculus. In Proc. 2nd International Symposium on Static Analysis, number 983 in Lecture Notes in Computer Science, pages 314-329. Springer, September 1995.
-
(1995)
Proc. 2nd International Symposium on Static Analysis
, pp. 314-329
-
-
Palsberg, J.1
ØRbaek, P.2
-
36
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Harvard Aiken Computation Laboratory
-
M. Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory, 1981.
-
(1981)
Technical Report TR-81
-
-
Rabin, M.1
-
37
-
-
0040283806
-
-
Java remote method interface (RMI). http://java.sun.com/products/jdk/rmi/.
-
-
-
-
39
-
-
0033700286
-
Probabilistic noninterference for multi-threaded programs
-
IEEE Computer Society Press, July
-
Andrei Sabelfeld and David Sands. Probabilistic noninterference for multi-threaded programs. In Proc. of the 13th IEEE Computer Security Foundations Workshop, pages 200-214. IEEE Computer Society Press, July 2000.
-
(2000)
Proc. of the 13th IEEE Computer Security Foundations Workshop
, pp. 200-214
-
-
Sabelfeld, A.1
Sands, D.2
-
40
-
-
0001778364
-
Enforceable security policies
-
Also available as TR 99-1759, Computer Science Department, Cornell University, Ithaca, New York
-
Fred B. Schneider. Enforceable security policies. ACM Transactions on Information and System Security, 2001. Also available as TR 99-1759, Computer Science Department, Cornell University, Ithaca, New York.
-
(2001)
ACM Transactions on Information and System Security
-
-
Schneider, F.B.1
-
41
-
-
0034835461
-
A new type system for secure information flow
-
IEEE Computer Society Press, jun
-
Geoffrey Smith. A new type system for secure information flow. In CSFW14, pages 115-125. IEEE Computer Society Press, jun 2001.
-
(2001)
CSFW14
, pp. 115-125
-
-
Smith, G.1
-
42
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
San Diego, California, January
-
Geoffrey Smith and Dennis Volpano. Secure information flow in a multi-threaded imperative language. In Proc. 25th ACM Symp. on Principles of Programming Languages (POPL), pages 355-364, San Diego, California, January 1998.
-
(1998)
Proc. 25th ACM Symp. on Principles of Programming Languages (POPL)
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
43
-
-
0005343322
-
-
Technical report, Project Athena, MIT, Cambridge, MA, March
-
J. G. Steiner, C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. Technical report, Project Athena, MIT, Cambridge, MA, March 1988.
-
(1988)
Kerberos: An Authentication Service for Open Network Systems
-
-
Steiner, J.G.1
Neuman, C.2
Schiller, J.I.3
-
44
-
-
0000990322
-
A survey of program slicing techniques
-
Frank Tip. A survey of program slicing techniques. Journal of Programming Languages, 3:121-189, 1995.
-
(1995)
Journal of Programming Languages
, vol.3
, pp. 121-189
-
-
Frank, T.1
-
46
-
-
0030370740
-
A sound type system for secure flow analysis
-
Dennis Volpano, Geoffrey Smith, and Cynthia Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
48
-
-
85084164692
-
SSH - Secure login connections over the Internet
-
San Jose, California
-
Tatu Ylonen. SSH - secure login connections over the Internet. In The Sixth USENIX Security Symposium Proceedings, pages 37-42, San Jose, California, 1996.
-
(1996)
The Sixth USENIX Security Symposium Proceedings
, pp. 37-42
-
-
Ylonen, T.1
-
49
-
-
0034822370
-
Robust declassification
-
Cape Breton, Nova Scotia, Canada, June
-
Steve Zdancewic and Andrew C. Myers. Robust declassification. In Proc. of the 14th IEEE Computer Security Foundations Workshop, pages 15-23, Cape Breton, Nova Scotia, Canada, June 2001.
-
(2001)
Proc. of the 14th IEEE Computer Security Foundations Workshop
, pp. 15-23
-
-
Zdancewic, S.1
Myers, A.C.2
-
51
-
-
0005257545
-
Secure program partitioning
-
Computer Science Dept., Cornell University
-
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers. Secure program partitioning. Technical Report 2001-1846, Computer Science Dept., Cornell University, 2001.
-
(2001)
Technical Report 2001-1846
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.C.4
|