메뉴 건너뛰기




Volumn 15, Issue 2, 2005, Pages 131-177

Stack-based access control and secure information flow

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; CONTROL MECHANISM; DYNAMIC BINDING; INFORMATION FLOW;

EID: 17044429386     PISSN: 09567968     EISSN: None     Source Type: Journal    
DOI: 10.1017/S0956796804005453     Document Type: Article
Times cited : (109)

References (58)
  • 6
    • 84948752619 scopus 로고    scopus 로고
    • Secure information flow and pointer confinement in a Java-like language
    • IEEE Press
    • Banerjee, A. and Naumann, D. A. (2002c) Secure information flow and pointer confinement in a Java-like language. IEEE Computer Security Foundations Workshop (CSFW), pp. 253-270. IEEE Press.
    • (2002) IEEE Computer Security Foundations Workshop (CSFW) , pp. 253-270
    • Banerjee, A.1    Naumann, D.A.2
  • 7
    • 33947655397 scopus 로고    scopus 로고
    • Using access control for secure information flow in a Java-like language
    • IEEE Press
    • Banerjee, A. and Naumann, D. A. (2003) Using access control for secure information flow in a Java-like language. IEEE Computer Security Foundations Workshop (CSFW), pp. 155-169. IEEE Press.
    • (2003) IEEE Computer Security Foundations Workshop (CSFW) , pp. 155-169
    • Banerjee, A.1    Naumann, D.A.2
  • 8
    • 84957671171 scopus 로고    scopus 로고
    • Partial evaluation and non-interference for object calculi
    • Middeldorp, A. and Sato, T. (eds.), Springer-Verlag
    • Barthe, G. and Serpette, B. (1999) Partial evaluation and non-interference for object calculi. In: Middeldorp, A. and Sato, T. (eds.), Proceedings of FLOPS'99: Lecture Notes in Computer Science 1722, pp. 53-67. Springer-Verlag.
    • (1999) Proceedings of FLOPS'99: Lecture Notes in Computer Science , vol.1722 , pp. 53-67
    • Barthe, G.1    Serpette, B.2
  • 14
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning, D. (1976) A lattice model of secure information flow. Comm. ACM, 19(5), 236-242.
    • (1976) Comm. ACM , vol.19 , Issue.5 , pp. 236-242
    • Denning, D.1
  • 15
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning, D. and Denning, P. (1977) Certification of programs for secure information flow. Comm. ACM, 20(7), 504-513.
    • (1977) Comm. ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.1    Denning, P.2
  • 23
    • 0038893943 scopus 로고    scopus 로고
    • Information flow vs. resource access in the asynchronous pi-calculus
    • Hennessy, M. and Riely, J. (2002) Information flow vs. resource access in the asynchronous pi-calculus. ACM Trans. Program. Langu. & Syst. 24(5), 566-591.
    • (2002) ACM Trans. Program. Langu. & Syst. , vol.24 , Issue.5 , pp. 566-591
    • Hennessy, M.1    Riely, J.2
  • 24
    • 84976745647 scopus 로고
    • Islands: Aliasing protection in object-oriented languages
    • ACM Symposium on Object Oriented Programming: Systems, Languages, and Applications (OOPSLA) ACM Press
    • Hogg, J. (1991) Islands: Aliasing protection in object-oriented languages. ACM Symposium on Object Oriented Programming: Systems, Languages, and Applications (OOPSLA). ACM Press. (SIGPLAN Notices, 26, 11.)
    • (1991) SIGPLAN Notices , vol.26 , pp. 11
    • Hogg, J.1
  • 27
    • 0034823079 scopus 로고    scopus 로고
    • A generic approach to the security of multi-threaded programs
    • Cape Breton, Nova Scotia, Canada. IEEE Press
    • Mantel, H. and Sabelfeld, A. (2001) A generic approach to the security of multi-threaded programs. Proc. 14th IEEE Computer Security Foundations Workshop, pp. 126-142. Cape Breton, Nova Scotia, Canada. IEEE Press.
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop , pp. 126-142
    • Mantel, H.1    Sabelfeld, A.2
  • 28
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • McLean, J. (1994) A general theory of composition for trace sets closed under selective interleaving functions. Proc. IEEE Symp. on Security and Privacy, pp. 79-93.
    • (1994) Proc. IEEE Symp. on Security and Privacy , pp. 79-93
    • McLean, J.1
  • 31
  • 35
  • 36
    • 3042874802 scopus 로고    scopus 로고
    • Trust in the λ-calculus
    • Ørbæk, P. and Palsberg, J. (1997) Trust in the λ-calculus. J. Funct. Program. 7(6), 557-591.
    • (1997) J. Funct. Program , vol.7 , Issue.6 , pp. 557-591
    • Ørbæk, P.1    Palsberg, J.2
  • 42
    • 0020919435 scopus 로고
    • Types, abstraction, and parametric polymorphism
    • Mason, R. E. A. (ed.), North-Holland
    • Reynolds, J. C. (1984) Types, abstraction, and parametric polymorphism. In: Mason, R. E. A. (ed.), Information Processing '83, pp. 513-523. North-Holland.
    • (1984) Information Processing '83 , pp. 513-523
    • Reynolds, J.C.1
  • 46
    • 0035276729 scopus 로고    scopus 로고
    • A Per model of secure information flow in sequential programs
    • Sabelfeld, A. and Sands, D. (2001) A Per model of secure information flow in sequential programs. Higher-order & Symbolic Comput. 14(1), 59-91.
    • (2001) Higher-order & Symbolic Comput. , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 50
    • 0019658399 scopus 로고
    • Access flows: A protection model which integrates access control and information flow
    • Stoughton, A. (1981) Access flows: A protection model which integrates access control and information flow. Proc. IEEE Symp. on Security and Privacy, pp. 9-18.
    • (1981) Proc. IEEE Symp. on Security and Privacy , pp. 9-18
    • Stoughton, A.1
  • 54
    • 84957709924 scopus 로고    scopus 로고
    • Safety versus secrecy. Static Analysis Symposium (SAS)
    • Springer-Verlag
    • Volpano, D. (1999) Safety versus secrecy. Static Analysis Symposium (SAS): Lecture Notes in Computer Science 1694, pp. 303-311. Springer-Verlag.
    • (1999) Lecture Notes in Computer Science , vol.1694 , pp. 303-311
    • Volpano, D.1
  • 57
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Volpano, D., Smith, G. and Irvine, C. (1996) A sound type system for secure flow analysis. J. Comput. Security, 4(3), 167-187.
    • (1996) J. Comput. Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.