-
2
-
-
0032681509
-
A core calculus of dependency
-
Abadi, M., Banerjee, A., Heintze, N. and Riecke, J. G. (1999) A core calculus of dependency. ACM Symposium on Principles of Programming Languages (POPL), pp. 147-160.
-
(1999)
ACM Symposium on Principles of Programming Languages (POPL)
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
6
-
-
84948752619
-
Secure information flow and pointer confinement in a Java-like language
-
IEEE Press
-
Banerjee, A. and Naumann, D. A. (2002c) Secure information flow and pointer confinement in a Java-like language. IEEE Computer Security Foundations Workshop (CSFW), pp. 253-270. IEEE Press.
-
(2002)
IEEE Computer Security Foundations Workshop (CSFW)
, pp. 253-270
-
-
Banerjee, A.1
Naumann, D.A.2
-
7
-
-
33947655397
-
Using access control for secure information flow in a Java-like language
-
IEEE Press
-
Banerjee, A. and Naumann, D. A. (2003) Using access control for secure information flow in a Java-like language. IEEE Computer Security Foundations Workshop (CSFW), pp. 155-169. IEEE Press.
-
(2003)
IEEE Computer Security Foundations Workshop (CSFW)
, pp. 155-169
-
-
Banerjee, A.1
Naumann, D.A.2
-
8
-
-
84957671171
-
Partial evaluation and non-interference for object calculi
-
Middeldorp, A. and Sato, T. (eds.), Springer-Verlag
-
Barthe, G. and Serpette, B. (1999) Partial evaluation and non-interference for object calculi. In: Middeldorp, A. and Sato, T. (eds.), Proceedings of FLOPS'99: Lecture Notes in Computer Science 1722, pp. 53-67. Springer-Verlag.
-
(1999)
Proceedings of FLOPS'99: Lecture Notes in Computer Science
, vol.1722
, pp. 53-67
-
-
Barthe, G.1
Serpette, B.2
-
9
-
-
84944249026
-
Security types preserving compilation
-
Springer-Verlag
-
Barthe, G., Basu, A. and Rezk, T. (2004) Security types preserving compilation. Proc. Verification, Model Checking, and Abstract Interpretation (VMCAI): Lecture Notes in Computer Science 2937. Springer-Verlag.
-
(2004)
Proc. Verification, Model Checking, and Abstract Interpretation (VMCAI): Lecture Notes in Computer Science
, vol.2937
-
-
Barthe, G.1
Basu, A.2
Rezk, T.3
-
14
-
-
0016949746
-
A lattice model of secure information flow
-
Denning, D. (1976) A lattice model of secure information flow. Comm. ACM, 19(5), 236-242.
-
(1976)
Comm. ACM
, vol.19
, Issue.5
, pp. 236-242
-
-
Denning, D.1
-
15
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning, D. and Denning, P. (1977) Certification of programs for secure information flow. Comm. ACM, 20(7), 504-513.
-
(1977)
Comm. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.1
Denning, P.2
-
17
-
-
0030708182
-
Providing flexibility in information flow control for object-oriented systems
-
Ferrari, E., Samarati, P., Bertino, E. and Jajodia, S. (1997) Providing flexibility in information flow control for object-oriented systems. Proc. IEEE Symp. on Security and Privacy, pp. 130-140.
-
(1997)
Proc. IEEE Symp. on Security and Privacy
, pp. 130-140
-
-
Ferrari, E.1
Samarati, P.2
Bertino, E.3
Jajodia, S.4
-
23
-
-
0038893943
-
Information flow vs. resource access in the asynchronous pi-calculus
-
Hennessy, M. and Riely, J. (2002) Information flow vs. resource access in the asynchronous pi-calculus. ACM Trans. Program. Langu. & Syst. 24(5), 566-591.
-
(2002)
ACM Trans. Program. Langu. & Syst.
, vol.24
, Issue.5
, pp. 566-591
-
-
Hennessy, M.1
Riely, J.2
-
24
-
-
84976745647
-
Islands: Aliasing protection in object-oriented languages
-
ACM Symposium on Object Oriented Programming: Systems, Languages, and Applications (OOPSLA) ACM Press
-
Hogg, J. (1991) Islands: Aliasing protection in object-oriented languages. ACM Symposium on Object Oriented Programming: Systems, Languages, and Applications (OOPSLA). ACM Press. (SIGPLAN Notices, 26, 11.)
-
(1991)
SIGPLAN Notices
, vol.26
, pp. 11
-
-
Hogg, J.1
-
25
-
-
0345241830
-
-
Addison-Wesley
-
LaMacchia, B. A., Lange, S., Lyons, M., Martin, R. and Price, K. T. (2003) .NET framework security. Addison-Wesley.
-
(2003)
.NET Framework Security
-
-
LaMacchia, B.A.1
Lange, S.2
Lyons, M.3
Martin, R.4
Price, K.T.5
-
27
-
-
0034823079
-
A generic approach to the security of multi-threaded programs
-
Cape Breton, Nova Scotia, Canada. IEEE Press
-
Mantel, H. and Sabelfeld, A. (2001) A generic approach to the security of multi-threaded programs. Proc. 14th IEEE Computer Security Foundations Workshop, pp. 126-142. Cape Breton, Nova Scotia, Canada. IEEE Press.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop
, pp. 126-142
-
-
Mantel, H.1
Sabelfeld, A.2
-
28
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
McLean, J. (1994) A general theory of composition for trace sets closed under selective interleaving functions. Proc. IEEE Symp. on Security and Privacy, pp. 79-93.
-
(1994)
Proc. IEEE Symp. on Security and Privacy
, pp. 79-93
-
-
McLean, J.1
-
30
-
-
0041525084
-
From system F to typed assembly language
-
Morrisett, G., Crary, K., Glew, N. and Walker, D. (1999) From system F to typed assembly language. ACM Trans. Program. Lang. & Syst. 21(3), 528-569.
-
(1999)
ACM Trans. Program. Lang. & Syst.
, vol.21
, Issue.3
, pp. 528-569
-
-
Morrisett, G.1
Crary, K.2
Glew, N.3
Walker, D.4
-
35
-
-
0002735526
-
Proof-carrying code
-
ACM Press
-
Necula, G. C. (1997) Proof-carrying code. Proceedings, POPL. ACM Press.
-
(1997)
Proceedings, POPL
-
-
Necula, G.C.1
-
36
-
-
3042874802
-
Trust in the λ-calculus
-
Ørbæk, P. and Palsberg, J. (1997) Trust in the λ-calculus. J. Funct. Program. 7(6), 557-591.
-
(1997)
J. Funct. Program
, vol.7
, Issue.6
, pp. 557-591
-
-
Ørbæk, P.1
Palsberg, J.2
-
37
-
-
84944677742
-
PVS: A prototype verification system
-
Kapur, Deepak (ed.), Springer-Verlag
-
Owre, S., Rushby, J. M. and Shankar, N. (1992) PVS: A prototype verification system. In: Kapur, Deepak (ed.), 11th International Conference on Automated Deduction (CADE): Lecture Notes in Artificial Intelligence 607, pp. 748-752. Springer-Verlag.
-
(1992)
11th International Conference on Automated Deduction (CADE): Lecture Notes in Artificial Intelligence
, vol.607
, pp. 748-752
-
-
Owre, S.1
Rushby, J.M.2
Shankar, N.3
-
41
-
-
84945270736
-
A systematic approach to static access control
-
Sands, D. (ed.), Springer-Verlag
-
Pottier, F., Skalka, C. and Smith, S. (2001) A systematic approach to static access control. In: Sands, D. (ed.), European Symposium on Programming (ESOP): Lecture Notes in Computer Science 2028, pp. 30-45. Springer-Verlag.
-
(2001)
European Symposium on Programming (ESOP): Lecture Notes in Computer Science
, vol.2028
, pp. 30-45
-
-
Pottier, F.1
Skalka, C.2
Smith, S.3
-
42
-
-
0020919435
-
Types, abstraction, and parametric polymorphism
-
Mason, R. E. A. (ed.), North-Holland
-
Reynolds, J. C. (1984) Types, abstraction, and parametric polymorphism. In: Mason, R. E. A. (ed.), Information Processing '83, pp. 513-523. North-Holland.
-
(1984)
Information Processing '83
, pp. 513-523
-
-
Reynolds, J.C.1
-
46
-
-
0035276729
-
A Per model of secure information flow in sequential programs
-
Sabelfeld, A. and Sands, D. (2001) A Per model of secure information flow in sequential programs. Higher-order & Symbolic Comput. 14(1), 59-91.
-
(2001)
Higher-order & Symbolic Comput.
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
50
-
-
0019658399
-
Access flows: A protection model which integrates access control and information flow
-
Stoughton, A. (1981) Access flows: A protection model which integrates access control and information flow. Proc. IEEE Symp. on Security and Privacy, pp. 9-18.
-
(1981)
Proc. IEEE Symp. on Security and Privacy
, pp. 9-18
-
-
Stoughton, A.1
-
52
-
-
35048864843
-
-
Static Analysis Symposium (SAS), Springer Verlag. Lecture Notes in Computer Science
-
Sun, Q., Banerjee, A. and Naumann, D. A. (2004) Modular and constraint-based information flow inference for an object-oriented language, Static Analysis Symposium (SAS), Springer Verlag. Lecture Notes in Computer Science, 3148, 84-99.
-
(2004)
Modular and Constraint-based Information Flow Inference for An Object-oriented Language
, vol.3148
, pp. 84-99
-
-
Sun, Q.1
Banerjee, A.2
Naumann, D.A.3
-
54
-
-
84957709924
-
Safety versus secrecy. Static Analysis Symposium (SAS)
-
Springer-Verlag
-
Volpano, D. (1999) Safety versus secrecy. Static Analysis Symposium (SAS): Lecture Notes in Computer Science 1694, pp. 303-311. Springer-Verlag.
-
(1999)
Lecture Notes in Computer Science
, vol.1694
, pp. 303-311
-
-
Volpano, D.1
-
57
-
-
0030370740
-
A sound type system for secure flow analysis
-
Volpano, D., Smith, G. and Irvine, C. (1996) A sound type system for secure flow analysis. J. Comput. Security, 4(3), 167-187.
-
(1996)
J. Comput. Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
58
-
-
0039334688
-
SAFKASI: A security mechanism for language-based systems
-
Wallach, D., Appel, A. and Felten, E. (2000) SAFKASI: a security mechanism for language-based systems. ACM Trans. Software Eng. & Methodology, 9(4).
-
(2000)
ACM Trans. Software Eng. & Methodology
, vol.9
, Issue.4
-
-
Wallach, D.1
Appel, A.2
Felten, E.3
|