-
1
-
-
84976840591
-
An axiomatic approach to information flow in programs
-
G. R. Andrews and R. P. Reitman. An axiomatic approach to information flow in programs. ACM Trans. Program. Lang. Syst., 2(1):56-76, 1980.
-
(1980)
ACM Trans. Program. Lang. Syst.
, vol.2
, Issue.1
, pp. 56-76
-
-
Andrews, G.R.1
Reitman, R.P.2
-
2
-
-
0027565268
-
What's in a region? Or computing control dependence regions on near-linear time for reducible control flow
-
T. Ball. What's in a region? or computing control dependence regions in near-linear time for reducible control flow. ACM Letters on Program. Lang. Syst., 2(1-4):1-16, 1993.
-
(1993)
ACM Letters on Program. Lang. Syst.
, vol.2
, Issue.1-4
, pp. 1-16
-
-
Ball, T.1
-
5
-
-
84894622815
-
Combining abstract interpretation and model checking for analysing security properties of java bytecode
-
C. Bernardeschi and N. D. Francesco. Combining abstract interpretation and model checking for analysing security properties of java bytecode. In WMCAI2002 Proceedings, pages 1-15, 2002.
-
(2002)
WMCAI2002 Proceedings
, pp. 1-15
-
-
Bernardeschi, C.1
Francesco, N.D.2
-
6
-
-
0010404992
-
Checking secure interactions of smart card applets
-
P. Bieber, J. Cazin, P. Girard, J.-L. Lanet, V. Wiels, and G. Zanon. Checking secure interactions of smart card applets. In ESORICS 2000 Proceedings, 2000.
-
ESORICS 2000 Proceedings, 2000
-
-
Bieber, P.1
Cazin, J.2
Girard, P.3
Lanet, J.-L.4
Wiels, V.5
Zanon, G.6
-
7
-
-
0017517624
-
Certification of programs for secure information flow
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. ACM, 20(7):504-513, 1977.
-
(1977)
Comm. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
9
-
-
0000046942
-
A security flow control algorithm and its denotational semantics correctness proof
-
M. Mizuno and D. A. Schmidt. A security flow control algorithm and its denotational semantics correctness proof. Formal Aspects of Computing, 4:727-754, 1992.
-
(1992)
Formal Aspects of Computing
, vol.4
, pp. 727-754
-
-
Mizuno, M.1
Schmidt, D.A.2
-
10
-
-
1542352579
-
Bytecode verification for java smartcards based on model checking
-
J. Possegga and H. Vogt. Bytecode verification for java smartcards based on model checking. In ESORICS 98 Proceedings, 1998.
-
ESORICS 98 Proceedings, 1998
-
-
Possegga, J.1
Vogt, H.2
-
12
-
-
0004220511
-
-
Addison-Wesley Publishing Company, Reading, Massachusetts
-
L. T. and F. Yellin. The java virtual machine specification. Addison-Wesley Publishing Company, Reading, Massachusetts, 1996.
-
(1996)
The Java Virtual Machine Specification
-
-
Yellin, F.1
-
13
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|