메뉴 건너뛰기




Volumn 3385, Issue , 2005, Pages 346-362

Information flow analysis for Java bytecode

Author keywords

[No Author keywords available]

Indexed keywords

BINARY CODES; BOOLEAN FUNCTIONS; GRAPH THEORY; INFORMATION ANALYSIS; MATHEMATICAL TRANSFORMATIONS;

EID: 24144440405     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30579-8_23     Document Type: Conference Paper
Times cited : (50)

References (26)
  • 2
    • 35048839749 scopus 로고    scopus 로고
    • Information Flow Analysis in Logical Form
    • R. Giacobazzi, editor, Lecture Notes in Computer Science. Springer-Verlag, August
    • T. Amtoft and A. Banerjee. Information Flow Analysis in Logical Form. In R. Giacobazzi, editor, Proceedings of the Eleventh International Static Analysis Symposium (SAS), Lecture Notes in Computer Science, pages 100-115. Springer-Verlag, August 2004.
    • (2004) Proceedings of the Eleventh International Static Analysis Symposium (SAS) , pp. 100-115
    • Amtoft, T.1    Banerjee, A.2
  • 4
    • 84944249026 scopus 로고    scopus 로고
    • Security types preserving compilation
    • VMCAI'04. Springer-Verlag
    • G. Barthe, A. Basu, and T. Rezk. Security Types Preserving Compilation. In VMCAI'04, volume 2937 of Lecture Notes in Computer Science. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2937
    • Barthe, G.1    Basu, A.2    Rezk, T.3
  • 6
    • 84937553676 scopus 로고    scopus 로고
    • Static analysis for secrecy and non-interference in networks of processes
    • Proc. of PaCT'01. Springer-Verlag
    • C. Bodei, P. Degano, F. Nielson, and H. Nielson. Static Analysis for Secrecy and non-interference in Networks of Processes. In Proc. of PaCT'01, volume 2127 of Lecture Notes in Computer Science, pages 27-41. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2127 , pp. 27-41
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Nielson, H.4
  • 8
    • 0022769976 scopus 로고
    • Graph-based algorithms for boolean function manipulation
    • R. E. Bryant. Graph-Based Algorithms for Boolean Function Manipulation. IEEE Transactions on Computers, 35(8):677-691, 1986.
    • (1986) IEEE Transactions on Computers , vol.35 , Issue.8 , pp. 677-691
    • Bryant, R.E.1
  • 9
    • 0036555709 scopus 로고    scopus 로고
    • Information flow for ALGOL-like languages
    • April
    • D. Clark, C. Hankin, and S. Hunt. Information Flow for ALGOL-like Languages. Computer Languages, 28(1):3-28, April 2002.
    • (2002) Computer Languages , vol.28 , Issue.1 , pp. 3-28
    • Clark, D.1    Hankin, C.2    Hunt, S.3
  • 10
    • 84948958710 scopus 로고
    • Optimization of object-oriented programs using static class hierarchy analysis
    • W. G. Olthoff, editor, Proc. of ECOOP'95, Århus, Denmark, August. Springer-Verlag
    • J. Dean, D. Grove, and C. Chambers. Optimization of Object-Oriented Programs using Static Class Hierarchy Analysis. In W. G. Olthoff, editor, Proc. of ECOOP'95, volume 952 of LNCS, pages 77-101, Århus, Denmark, August 1995. Springer-Verlag.
    • (1995) LNCS , vol.952 , pp. 77-101
    • Dean, J.1    Grove, D.2    Chambers, C.3
  • 11
    • 0016949746 scopus 로고
    • A lattice model of secure Information flow
    • D. E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5):236-242, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-242
    • Denning, D.E.1
  • 12
    • 33645583467 scopus 로고    scopus 로고
    • Modeling secure information flow with boolean functions
    • P. Ryan, editor, April
    • S. Genaim, R. Giacobazzi, and I. Mastroeni. Modeling Secure Information Flow with Boolean Functions. In P. Ryan, editor, WITS'04, April 2004.
    • (2004) WITS'04
    • Genaim, S.1    Giacobazzi, R.2    Mastroeni, I.3
  • 15
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • Programming Languages and Systems, 10th European Symposium On Programming, ESOP. Springer-Ver lag
    • P. Laud. Semantics and Program Analysis of Computationally Secure Information Flow. In Programming Languages and Systems, 10th European Symposium On Programming, ESOP, volume 2028 of Lecture Notes in Computer Science, pages 77-91. Springer-Ver lag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2028 , pp. 77-91
    • Laud, P.1
  • 18
  • 19
  • 21
    • 0035276729 scopus 로고    scopus 로고
    • A PER model of secure information flow in sequential programs
    • A. Sabelfeld and D. Sands. A PER Model of Secure Information Flow in Sequential Programs. Higher-Order and Symbolic Computation, 14(1):59-91, 2001.
    • (2001) Higher-order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 22
    • 0003132401 scopus 로고    scopus 로고
    • Static enforcement of security with types
    • ACM press
    • C. Skalka and S. Smith. Static Enforcement of Security with Types. In ICFP'00, pages 254-267. ACM press, 2000.
    • (2000) ICFP'00 , pp. 254-267
    • Skalka, C.1    Smith, S.2
  • 25
  • 26
    • 84945262623 scopus 로고    scopus 로고
    • Secure information flow and CPS
    • D. Sands, editor, ESOP. Springer
    • S. Zdancewic and A. C. Myers. Secure Information Flow and CPS. In D. Sands, editor, ESOP, volume 2028 of Lecture Notes in Computer Science, pages 46-61. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2028 , pp. 46-61
    • Zdancewic, S.1    Myers, A.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.