-
1
-
-
0032681509
-
A core calculus of dependency
-
M. Abadi, A. Banerjee, N. Heintze and J. Riecke, A core calculus of dependency, in: Proceedings of the ACM Symposium on Principles of Programming Languages, 1999, pp. 147-160.
-
(1999)
Proceedings of the ACM Symposium on Principles of Programming Languages
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.4
-
5
-
-
0004255836
-
-
Prentice-Hall
-
J. Armstrong, R. Virding, C. Wikström and M. Williams, Concurrent Programming in Erlang, 2nd edn, Prentice-Hall, 1996.
-
(1996)
Concurrent Programming in Erlang, 2nd Edn
-
-
Armstrong, J.1
Virding, R.2
Wikström, C.3
Williams, M.4
-
7
-
-
84976675687
-
Information transmission in computational systems
-
E.S. Cohen, Information transmission in computational systems, ACM SIGOPS Operating Systems Review 11(5) (1977), 133-139.
-
(1977)
ACM SIGOPS Operating Systems Review
, vol.11
, Issue.5
, pp. 133-139
-
-
Cohen, E.S.1
-
8
-
-
0001760770
-
Information transmission in sequential programs
-
R.A. DeMillo, D.P. Dobkin, A.K. Jones and R.J. Lipton, eds, Academic Press
-
E.S. Cohen, Information transmission in sequential programs, in: Foundations of Secure Computation, R.A. DeMillo, D.P. Dobkin, A.K. Jones and R.J. Lipton, eds, Academic Press, 1978, pp. 297-335.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
10
-
-
0016949746
-
A lattice model of secure information flow
-
D.E. Denning, A lattice model of secure information flow, Communications of the ACM 19(5) (1976), 236-243.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
11
-
-
0017517624
-
Certification of programs for secure information flow
-
D.E. Denning and P.J. Denning, Certification of programs for secure information flow, Communications of the ACM 20(7) (1977), 504-513.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
12
-
-
84974776068
-
A classification of security properties for process algebras
-
R. Focardi and R. Gorrieri, A classification of security properties for process algebras, Journal of Computer Security 3(1) (1995), 5-33.
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
21
-
-
0033751850
-
A semantic approach to secure information flow
-
R. Joshi and K.R.M. Leino, A semantic approach to secure information flow, Science of Computer Programming 37(1-3) (2000), 113-138.
-
(2000)
Science of Computer Programming
, vol.37
, Issue.1-3
, pp. 113-138
-
-
Joshi, R.1
Leino, K.R.M.2
-
23
-
-
84944059120
-
Unwinding possibilistic security properties
-
Proceedings of the European Symposium on Research in Computer Security, Springer-Verlag
-
H. Mantel, Unwinding possibilistic security properties, in: Proceedings of the European Symposium on Research in Computer Security, Volume 1895 of LNCS, Springer-Verlag, 2000, pp. 238-254.
-
(2000)
LNCS
, vol.1895
, pp. 238-254
-
-
Mantel, H.1
-
24
-
-
84881123660
-
Information flow control and applications - Bridging a gap
-
Proceedings of the International Symposium of Formal Methods Europe, Springer-Verlag
-
H. Mantel, Information flow control and applications - Bridging a gap. in: Proceedings of the International Symposium of Formal Methods Europe, Volume 2021 of LNCS, Springer-Verlag, 2001, pp. 153-172.
-
(2001)
LNCS
, vol.2021
, pp. 153-172
-
-
Mantel, H.1
-
30
-
-
84974747891
-
Proving noninterference and functional correctness using traces
-
J. McLean, Proving noninterference and functional correctness using traces. Journal of Computer Security 1(1) (1992), 37-58.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.1
, pp. 37-58
-
-
McLean, J.1
-
31
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
J. McLean, A general theory of composition for trace sets closed under selective interleaving functions, in: Proceedings of the IEEE Symposium on Security and Privacy. 1994, pp. 79-93.
-
(1994)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 79-93
-
-
McLean, J.1
-
33
-
-
0001868056
-
Non-interference through determinism
-
Proceedings of the European Symposium on Research in Computer Security, Springer-Verlag
-
A.W. Roscoe, J.C.P. Woodcock and L. Wulf, Non-interference through determinism, in: Proceedings of the European Symposium on Research in Computer Security, Volume 875 of LNCS, Springer-Verlag, 1994, pp. 33-53.
-
(1994)
LNCS
, vol.875
, pp. 33-53
-
-
Roscoe, A.W.1
Woodcock, J.C.P.2
Wulf, L.3
-
35
-
-
84885715358
-
The impact of synchronisation on secure information flow in concurrent programs
-
Proceedings of the Andrei Ershov International Conference on Perspectives of System Informatics, Springer-Verlag
-
A. Sabelfeld, The impact of synchronisation on secure information flow in concurrent programs, in: Proceedings of the Andrei Ershov International Conference on Perspectives of System Informatics, Volume 2244 of LNCS, Springer-Verlag, 2001, pp. 227-241.
-
(2001)
LNCS
, vol.2244
, pp. 227-241
-
-
Sabelfeld, A.1
-
36
-
-
84958755151
-
Static confidentiality enforcement for distributed programs
-
Proceedings of the International Symposium on Static Analysis, Springer-Verlag
-
A. Sabelfeld and H. Mantel, Static confidentiality enforcement for distributed programs, in: Proceedings of the International Symposium on Static Analysis. Volume 2477 of LNCS, Springer-Verlag, 2002, pp. 376-394.
-
(2002)
LNCS
, vol.2477
, pp. 376-394
-
-
Sabelfeld, A.1
Mantel, H.2
-
39
-
-
0035276729
-
A per model of secure information flow in sequential programs
-
A. Sabelfeld and D. Sands, A per model of secure information flow in sequential programs, Higher Order and Symbolic Computation 14(1) (2001), 59-91.
-
(2001)
Higher Order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
44
-
-
0033330060
-
Probabilistic noninterference in a concurrent language
-
D. Volpano and G. Smith, Probabilistic noninterference in a concurrent language, Journal of Computer Security 7(2-3) (1999), 231-253.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 231-253
-
-
Volpano, D.1
Smith, G.2
-
45
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith and C. Irvine, A sound type system for secure flow analysis, Journal of Computer Security 4(3) (1996), 167-187.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
50
-
-
0036036793
-
Untrusted hosts and confidentiality: Secure program partitioning
-
S. Zdancewic, L. Zheng, N. Nystrom and A.C. Myers, Untrusted hosts and confidentiality: Secure program partitioning, in: Proceedings of the ACM Symposium on Operating System Principles, 2001, pp. 1-14.
-
(2001)
Proceedings of the ACM Symposium on Operating System Principles
, pp. 1-14
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.C.4
|