메뉴 건너뛰기




Volumn , Issue , 2004, Pages 39-46

Dynamic label binding at run-time

Author keywords

Data labeling; Information flow control; Labels

Indexed keywords

CALCULATIONS; CODES (SYMBOLS); COMPUTER CRIME; COMPUTER PROGRAMMING LANGUAGES; DATA TRANSFER; INFORMATION DISSEMINATION; LABELS; MANIPULATORS; MILITARY APPLICATIONS;

EID: 17644378117     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (8)

References (30)
  • 4
    • 0003400251 scopus 로고
    • Secure computer systems: A mathematical model
    • MITRE Corp., Bedford, MA
    • D. E. Bell and L. J. LaPadula, "Secure computer systems: A mathematical model." Tech. Rep. MTR-2547, Vol. 2, MITRE Corp., Bedford, MA, 1973.
    • (1973) Tech. Rep. MTR-2547 , vol.2
    • Bell, D.E.1    Lapadula, L.J.2
  • 5
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • MITRE Corp., Bedford, MA
    • D. E. Bell and L. J. LaPadula, "Secure computer systems: Mathematical foundations." Tech. Rep. MTR-2547, Vol. 1, MITRE Corp., Bedford, MA, 1973.
    • (1973) Tech. Rep. MTR-2547 , vol.1
    • Bell, D.E.1    Lapadula, L.J.2
  • 6
    • 17644417297 scopus 로고    scopus 로고
    • A minimal trusted computing base for dynamically ensuring secure information flow
    • MIT, November
    • J. Brown, T.F. Knight, Jr. "A Minimal Trusted Computing Base for Dynamically Ensuring Secure Information Flow". Project Aries Technical Memo ARIES-TM-015, MIT, November 2001.
    • (2001) Project Aries Technical Memo , vol.ARIES-TM-015
    • Brown, J.1    Knight Jr., T.F.2
  • 9
    • 24644447479 scopus 로고    scopus 로고
    • Intel-procedural data flow recovery of high-level language code from assembly
    • Department of Computer Science and Electrical Engineering, The University of Queensland, December
    • C Cifuentes and A Fraboulet, "Intel-procedural Data Flow Recovery of High-level Language Code from Assembly". Technical Report 421, Department of Computer Science and Electrical Engineering, The University of Queensland, December 1997.
    • (1997) Technical Report , vol.421
    • Cifuentes, C.1    Fraboulet, A.2
  • 10
    • 0016949746 scopus 로고
    • A lattice model of secure execution
    • May
    • D. E. Denning, "A Lattice Model of Secure Execution." In Communications of the ACM, vol. 19, no. 5, May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5
    • Denning, D.E.1
  • 11
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning, "Certification of programs for secure information flow." Communications of the ACM, vol. 20, no. 7, July 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7
    • Denning, D.E.1    Denning, P.J.2
  • 14
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • May
    • J. S. Fenton, "Memoryless subsystems." Computing Journal, vol. 17, no. 2, pp. 143-147, May 1974.
    • (1974) Computing Journal , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 29
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, G. Smith, and C. Irvine, "A sound type system for secure flow analysis." Journal of Computer Security, vol. 4, no. 3, pp. 167-187, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.