-
1
-
-
0348207246
-
A software validation technique for certification: The methodology
-
Tech. Rep. MTR-2932, MITRE Corp. Badford, MA
-
Bell, D. E., and Burke, E. A software validation technique for certification: The methodology. Tech. Rep. MTR-2932, MITRE Corp. Badford, MA, 1974.
-
(1974)
-
-
Bell, D.E.1
Burke, E.2
-
2
-
-
0003400257
-
Secure computer systems: Mathematical foundations and model
-
Tech. Rep. M74-244, MITRE Corp. Badford, MA
-
Bell, D. E., and LaPadula, L. J. Secure computer systems: Mathematical foundations and model. Tech. Rep. M74-244, MITRE Corp. Badford, MA, 1973.
-
(1973)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
3
-
-
84937553676
-
Static analysis for secrecy and non-interference in networks of processes
-
Springer-Verlag
-
Bodei, C., Degano, P., Nielson, F., and Nielson, H. Static analysis for secrecy and non-interference in networks of processes. In Proc. of 6th Internat. Conference on Parallel Computing Technologies : (PaCT'01) (2001), vol. 2127 of Lecture Notes in Computer Science, Springer-Verlag, pp. 27-41.
-
Proc. of 6th Internat. Conference on Parallel Computing Technologies : (PaCT'01) (2001), Vol. 2127 of Lecture Notes in Computer Science
, pp. 27-41
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.4
-
4
-
-
0036555709
-
Information flow for algol-like languages
-
Clark, D., Hankin, C., and Hunt, S. Information flow for algol-like languages. Computer Languages 28, 1 (2002), 3-28.
-
(2002)
Computer Languages
, vol.28
, Issue.1
, pp. 3-28
-
-
Clark, D.1
Hankin, C.2
Hunt, S.3
-
5
-
-
84976675687
-
Information transmission in computational systems
-
Cohen, E. S. Information transmission in computational systems. ACM SIGOPS Operating System Review 11, 5, (1977), 133-139.
-
(1977)
ACM SIGOPS Operating System Review
, vol.11
, Issue.5
, pp. 133-139
-
-
Cohen, E.S.1
-
6
-
-
0037188218
-
Constructive design of a hierarchy of semantics of a transition system by abstract interpretation
-
Cousot, P. Constructive design of a hierarchy of semantics of a transition system by abstract interpretation. Theor. Comput. Sci. 277, 1-2, (2002), 47,103.
-
(2002)
Theor. Comput. Sci.
, vol.277
, Issue.1-2
-
-
Cousot, P.1
-
7
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
ACM Press, New York
-
Cousot, P., and Cousot, R. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Conference Record of the 4th ACM Symp. on Principles of Programming Languages (POPL '77) (1977), ACM Press, New York, pp. 238-252.
-
(1977)
Conference Record of the 4th ACM Symp. on Principles of Programming Languages (POPL '77)
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
8
-
-
84972546036
-
Constructive versions of Tarski's fixed point theorems
-
Cousot, P., and Cousot, R. Constructive versions of Tarski's fixed point theorems. Pacific J. Math. 82, 1 (1979), 43-57.
-
(1979)
Pacific J. Math.
, vol.82
, Issue.1
, pp. 43-57
-
-
Cousot, P.1
Cousot, R.2
-
9
-
-
0018294932
-
Systematic design of program analysis frameworks
-
ACM Press, New York
-
Cousot, P., and Cousot, R. Systematic design of program analysis frameworks. In Conference Record of the 6th ACM Symp. on Principles of Programming Languages (POPL '79) (1979), ACM Press, New York, pp. 269-282.
-
Conference Record of the 6th ACM Symp. on Principles of Programming Languages (POPL '79) (1979)
, pp. 269-282
-
-
Cousot, P.1
Cousot, R.2
-
10
-
-
0026992713
-
Inductive definitions, semantics and abstract interpretation
-
ACM Press, New York
-
Cousot, P., and Cousot, R. Inductive definitions, semantics and abstract interpretation. In Conference Record of the 19th ACM Symp. on Principles of Programming Languages (POPL '92) (1992), ACM Press, New York, pp. 83-94.
-
Conference Record of the 19th ACM Symp. on Principles of Programming Languages (POPL '92) (1992)
, pp. 83-94
-
-
Cousot, P.1
Cousot, R.2
-
12
-
-
0041684496
-
Secure information flow in computer systems
-
PhD thesis, Purdue University
-
Denning, D. E. Secure Information Flow in Computer Systems. PhD thesis, Purdue University. 1975.
-
(1975)
-
-
Denning, D.E.1
-
13
-
-
0016949746
-
A lattice model of secure information flow
-
Denning, D. E. A lattice model of secure information flow. Communications of the ACM 19, 5 (1976), 236-242.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-242
-
-
Denning, D.E.1
-
14
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning, D. E., and Denning, P. Certification of programs for secure information flow. Communications of the ACM 20, 7 (1977), 504-513.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.2
-
15
-
-
84948746951
-
Approximate non-interference
-
IEEE Computer Society Press
-
Di Pierro, A., Hankins, C., and Wiklicky, H. Approximate non-interference. In Proc. of the IEEE Computer Security Foundations Workshop (2002), IEEE Computer Society Press, pp. 1-17.
-
Proc. of the IEEE Computer Security Foundations Workshop (2002)
, pp. 1-17
-
-
Di Pierro, A.1
Hankins, C.2
Wiklicky, H.3
-
16
-
-
0001052191
-
A unifying view of abstract domain design
-
Filé, G., Giacobazzi, R., and Ranzato, F. A unifying view of abstract domain design. ACM Comput. Surv. 28, 2 (1996), 333-336.
-
(1996)
ACM Comput. Surv.
, vol.28
, Issue.2
, pp. 333-336
-
-
Filé, G.1
Giacobazzi, R.2
Ranzato, F.3
-
17
-
-
84890021811
-
Incompleteness, counterexamples and refinements in abstract model-checking. In Proc. of The 8th Internat. Static Analysis Symposium, (SAS'01)
-
P. Couost. Ed.; Springer-Verlag
-
Giacobazzi, R., and Quintarelli, E. Incompleteness, counterexamples and refinements in abstract model-checking. In Proc. of The 8th Internat. Static Analysis Symposium, (SAS'01) (2001), P. Couost. Ed., vol. 2126 of Lecture Notes in Computer Science, Springer-Verlag, pp. 356-373.
-
(2001)
Lecture Notes in Computer Science
, vol.2126
, pp. 356-373
-
-
Giacobazzi, R.1
Quintarelli, E.2
-
18
-
-
1442284557
-
Refining and compressing abstract domains. In Proc. of the 24th Internat. Colloq. on Automata, Languages and Programming (ICALP '97)
-
P. Degano, R. Gorrieri, and A. Marchetti-Spaccamelai Eds.; Springer-Verlag, Berlin
-
Giacobazzi, R., and Ranzato, F. Refining and compressing abstract domains. In Proc. of the 24th Internat. Colloq. on Automata, Languages and Programming (ICALP '97) (1997), P. Degano, R. Gorrieri, and A. Marchetti-Spaccamela, Eds., vol. 1256, of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp. 771-781.
-
(1997)
Lecture Notes in Computer Science
, vol.1256
, pp. 771-781
-
-
Giacobazzi, R.1
Ranzato, F.2
-
19
-
-
0032163337
-
Optimal domains for disjunctive abstract interpretation
-
Giacobazzi, R., and Ranzato, F. Optimal domains for disjunctive abstract interpretation. Sci. Comput. Program. 32, 1-3 (1998), 177-210.
-
(1998)
Sci. Comput. Program
, vol.32
, Issue.1-3
, pp. 177-210
-
-
Giacobazzi, R.1
Ranzato, F.2
-
20
-
-
0000651947
-
Making abstract interpretations complete
-
Giacobazzi, R., Ranzato, F., and Scozzari, F. Making abstract interpretations complete. J. of the ACM. 47, 2 (2000), 361-416.
-
(2000)
J. of the ACM
, vol.47
, Issue.2
, pp. 361-416
-
-
Giacobazzi, R.1
Ranzato, F.2
Scozzari, F.3
-
23
-
-
0033751850
-
A semantic approach to secure information flow
-
Joshi, R., and Leino, K. R. M. A semantic approach to secure information flow. Sci. Comput. Program. 37 (2000), 113-138.
-
(2000)
Sci. Comput. Program
, vol.37
, pp. 113-138
-
-
Joshi, R.1
Leino, K.R.M.2
-
25
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
Springer-Verlag
-
Laud, P. Semantics and program analysis of computationally secure information flow. In In Programming Languages and Systems, 10th European Symposium On Programming, (ESOP'01) (2001) vol. 2028 of Lecture Notes in Computer Science, Springer-Verlag, pp. 77-91.
-
In Programming Languages and Systems, 10th European Symposium on Programming, (ESOP'01) (2001), Vol. 2028 of Lecture Notes in Computer Science
, pp. 77-91
-
-
Laud, P.1
-
28
-
-
1442284555
-
Can you trust your data? In Proc. of the 6th Internat. Joint Conf. CAAP/FASE, Theory and Practice of Software Development (TAPSOFT '95)
-
P. Mosses, M. Nielsen, and M. Schwartzbach, Eds.; Springer-Verlag
-
Ørbæk, P. Can you trust your data? In Proc. of the 6th Internat. Joint Conf. CAAP/FASE, Theory and Practice of Software Development (TAPSOFT '95) (1995) P. Mosses, M. Nielsen, and M. Schwartzbach, Eds., vol. 915 of Lecture Notes in Computer Science, Springer-Verlag, pp. 575-589.
-
(1995)
Lecture Notes in Computer Science
, vol.915
, pp. 575-589
-
-
Ørbæk, P.1
-
29
-
-
84958765240
-
Making abstract model checking strongly preserving. In Proc. of The 9th Internat. Static Analysis Symposium, (SAS'02)
-
M. Hermenegildo and G. Puebla, Eds.; Springer-Verlag
-
Ranzato, F., and Tapparo, F. Making abstract model checking strongly preserving. In Proc. of The 9th Internat. Static Analysis Symposium, (SAS'02) (2002), M. Hermenegildo and G. Puebla, Eds., vol. 2477 of Lecture Notes in Computer Science, Springer-Verlag, pp. 411-427.
-
(2002)
Lecture Notes in Computer Science
, vol.2477
, pp. 411-427
-
-
Ranzato, F.1
Tapparo, F.2
-
30
-
-
0037251378
-
Language-based information-flow security
-
Sabelfeld, A., and Myers, A. Language-based information-flow security. IEEE J. on selected area in communications 21, 1 (2003), 5-19.
-
(2003)
IEEE J. on Selected Area in Communications
, vol.21
, Issue.1
, pp. 5-19
-
-
Sabelfeld, A.1
Myers, A.2
-
31
-
-
0035276729
-
A PER model of secure information flow in sequential programs
-
Sabelfeld, A., and Sands, D. A PER model of secure information flow in sequential programs. Higher-Order and Symbolic Computation 14, 1 (2001), 59-91.
-
(2001)
Higher-Order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
32
-
-
0012889295
-
A language-based approach to security
-
Springer-Verlag
-
Schneider, F., Morrisett, G., and Harper, R. A language-based approach to security. In In Informatics: 10 Years Back, 10 Years Ahead (2000), vol. 2000 of Lecture Notes in Computer Science, Springer-Verlag, pp. 86-101.
-
In Informatics: 10 Years Back, 10 Years Ahead (2000), Vol. 2000 of Lecture Notes in Computer Science
, pp. 86-101
-
-
Schneider, F.1
Morrisett, G.2
Harper, R.3
-
33
-
-
0003132401
-
Static enforcement of security with types
-
ACM Press, New York
-
Skalka, C., and Smith, S. Static enforcement of security with types. In Proc. Internat. Conference on Functional Programming (ICFP'00) (2000), ACM Press, New York, pp. 254-267.
-
Proc. Internat. Conference on Functional Programming (ICFP'00) (2000)
, pp. 254-267
-
-
Skalka, C.1
Smith, S.2
-
34
-
-
84957709924
-
Safety versus secrecy. In Proc. of the 6th Internat. Static Analysis Symposium (SAS'99)
-
A Cortesi and G. Filé, Eds.; Springer-Verlag
-
Volpano, D. Safety versus secrecy. In Proc. of the 6th Internat. Static Analysis Symposium (SAS'99) (1999), A Cortesi and G. Filé, Eds., vol. 1694, of Lecture Notes in Computer Science, Springer-Verlag, pp. 303-311.
-
(1999)
Lecture Notes in Computer Science
, vol.1694
, pp. 303-311
-
-
Volpano, D.1
-
35
-
-
0033705210
-
Verifying secrets and relative secrecy
-
ACM Press, New York
-
Volpano, D., and Smith, G. Verifying secrets and relative secrecy. In Conference Record of the 27th ACM Symp. on Principles of Programming Languages (POPL '00) (2000), ACM Press, New York, pp. 268-276.
-
Conference Record of the 27th ACM Symp. on Principles of Programming Languages (POPL '00) (2000)
, pp. 268-276
-
-
Volpano, D.1
Smith, G.2
-
36
-
-
0030370740
-
A sound type system for secure flow analysis
-
Volpano, D., Smith, G., and Irvine, C. A sound type system for secure flow analysis. J. of Computer Security 4 2,3 (1996), 167-187.
-
(1996)
J. of Computer Security
, vol.4
, Issue.2-3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
39
-
-
84958749689
-
Security typings by abstract interpretation. In Proc. of The 9th Internat. Static Analysis Symposium, (SAS'02)
-
M. Hermenegildo and H. Puebla, Eds; Springer-Verlag
-
Zanotti, M. Security typings by abstract interpretation. In Proc. of The 9th Internat. Static Analysis Symposium, (SAS'02) (2002) M. Hermenegildo and H. Puebla, Eds, vol. 2477 of Lecture Notes in Computer Science, Springer-Verlag, pp. 360-375.
-
(2002)
Lecture Notes in Computer Science
, vol.2477
, pp. 360-375
-
-
Zanotti, M.1
|