-
2
-
-
35048839749
-
Information Flow Analysis in Logical Form
-
R. Giacobazzi, editor, Lecture Notes in Computer Science. Springer-Verlag, August
-
T. Amtoft and A. Banerjee. Information Flow Analysis in Logical Form. In R. Giacobazzi, editor, Proceedings of the Eleventh International Static Analysis Symposium (SAS), Lecture Notes in Computer Science, pages 100-115. Springer-Verlag, August 2004.
-
(2004)
Proceedings of the Eleventh International Static Analysis Symposium (SAS)
, pp. 100-115
-
-
Amtoft, T.1
Banerjee, A.2
-
4
-
-
84944249026
-
Security types preserving compilation
-
VMCAI'04. Springer-Verlag
-
G. Barthe, A. Basu, and T. Rezk. Security Types Preserving Compilation. In VMCAI'04, volume 2937 of Lecture Notes in Computer Science. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2937
-
-
Barthe, G.1
Basu, A.2
Rezk, T.3
-
6
-
-
84937553676
-
Static analysis for secrecy and non-interference in networks of processes
-
Proc. of PaCT'01. Springer-Verlag
-
C. Bodei, P. Degano, F. Nielson, and H. Nielson. Static Analysis for Secrecy and non-interference in Networks of Processes. In Proc. of PaCT'01, volume 2127 of Lecture Notes in Computer Science, pages 27-41. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2127
, pp. 27-41
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.4
-
8
-
-
0022769976
-
Graph-based algorithms for boolean function manipulation
-
R. E. Bryant. Graph-Based Algorithms for Boolean Function Manipulation. IEEE Transactions on Computers, 35(8):677-691, 1986.
-
(1986)
IEEE Transactions on Computers
, vol.35
, Issue.8
, pp. 677-691
-
-
Bryant, R.E.1
-
9
-
-
0036555709
-
Information flow for ALGOL-like languages
-
April
-
D. Clark, C. Hankin, and S. Hunt. Information Flow for ALGOL-like Languages. Computer Languages, 28(1):3-28, April 2002.
-
(2002)
Computer Languages
, vol.28
, Issue.1
, pp. 3-28
-
-
Clark, D.1
Hankin, C.2
Hunt, S.3
-
10
-
-
84948958710
-
Optimization of object-oriented programs using static class hierarchy analysis
-
W. G. Olthoff, editor, Proc. of ECOOP'95, Århus, Denmark, August. Springer-Verlag
-
J. Dean, D. Grove, and C. Chambers. Optimization of Object-Oriented Programs using Static Class Hierarchy Analysis. In W. G. Olthoff, editor, Proc. of ECOOP'95, volume 952 of LNCS, pages 77-101, Århus, Denmark, August 1995. Springer-Verlag.
-
(1995)
LNCS
, vol.952
, pp. 77-101
-
-
Dean, J.1
Grove, D.2
Chambers, C.3
-
11
-
-
0016949746
-
A lattice model of secure Information flow
-
D. E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5):236-242, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-242
-
-
Denning, D.E.1
-
12
-
-
33645583467
-
Modeling secure information flow with boolean functions
-
P. Ryan, editor, April
-
S. Genaim, R. Giacobazzi, and I. Mastroeni. Modeling Secure Information Flow with Boolean Functions. In P. Ryan, editor, WITS'04, April 2004.
-
(2004)
WITS'04
-
-
Genaim, S.1
Giacobazzi, R.2
Mastroeni, I.3
-
15
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
Programming Languages and Systems, 10th European Symposium On Programming, ESOP. Springer-Ver lag
-
P. Laud. Semantics and Program Analysis of Computationally Secure Information Flow. In Programming Languages and Systems, 10th European Symposium On Programming, ESOP, volume 2028 of Lecture Notes in Computer Science, pages 77-91. Springer-Ver lag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2028
, pp. 77-91
-
-
Laud, P.1
-
18
-
-
0012798482
-
A least fixed point approach to inter-procedural information flow control
-
M. Mizuno. A Least Fixed Point Approach to Inter-Procedural Information Flow Control. In Proc. 12th NIST-NCSC National Computer Security Conference, pages 558-570, 1989.
-
(1989)
Proc. 12th NIST-NCSC National Computer Security Conference
, pp. 558-570
-
-
Mizuno, M.1
-
19
-
-
0032646625
-
J. practical mostly-static information flow control
-
San Antonio, Texas
-
J. Practical Mostly-Static Information Flow Control. Andrew c. myers. In 26th ACM Symposium on Principles of Programming Languages, pages 228-241, San Antonio, Texas, 1999.
-
(1999)
26th ACM Symposium on Principles of Programming Languages
, pp. 228-241
-
-
Myers, A.C.1
-
21
-
-
0035276729
-
A PER model of secure information flow in sequential programs
-
A. Sabelfeld and D. Sands. A PER Model of Secure Information Flow in Sequential Programs. Higher-Order and Symbolic Computation, 14(1):59-91, 2001.
-
(2001)
Higher-order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
22
-
-
0003132401
-
Static enforcement of security with types
-
ACM press
-
C. Skalka and S. Smith. Static Enforcement of Security with Types. In ICFP'00, pages 254-267. ACM press, 2000.
-
(2000)
ICFP'00
, pp. 254-267
-
-
Skalka, C.1
Smith, S.2
-
25
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A Sound Type System for Secure Flow Analysis. Journal of Computer Security, 4(2,3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
26
-
-
84945262623
-
Secure information flow and CPS
-
D. Sands, editor, ESOP. Springer
-
S. Zdancewic and A. C. Myers. Secure Information Flow and CPS. In D. Sands, editor, ESOP, volume 2028 of Lecture Notes in Computer Science, pages 46-61. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2028
, pp. 46-61
-
-
Zdancewic, S.1
Myers, A.C.2
|