-
1
-
-
14844353524
-
A theorem proving approach to analysis of secure information flow
-
Department of Computing Science, Chalmers University of Technology and Göteborg University
-
Ádám Darvas, R. Hähnle, and D. Sands, A theorem proving approach to analysis of secure information flow. Technical Report 2004-01, Department of Computing Science, Chalmers University of Technology and Göteborg University, 2004.
-
(2004)
Technical Report
, vol.2004
, Issue.1
-
-
Darvas, Á.1
Hähnle, R.2
Sands, D.3
-
2
-
-
4644347087
-
The KeY tool
-
Online First issue, to appear in print
-
W. Ahrendt, T. Baar, B. Beckert, R. Bubel, M. Giese, R. Hähnle, W. Menzel, W. Mostowski, A. Roth, S. Schlager, and P. H. Schmitt. The KeY tool. Software and System Modeling, 2004. Online First issue, to appear in print.
-
(2004)
Software and System Modeling
-
-
Ahrendt, W.1
Baar, T.2
Beckert, B.3
Bubel, R.4
Giese, M.5
Hähnle, R.6
Menzel, W.7
Mostowski, W.8
Roth, A.9
Schlager, S.10
Schmitt, P.H.11
-
4
-
-
84944238972
-
A dynamic logic for the formal verification of Java Card programs
-
B. Beckert. A dynamic logic for the formal verification of Java Card programs. In Java on Smart Cards: Programming and Security, pages 6-24, 2001.
-
(2001)
Java on Smart Cards: Programming and Security
, pp. 6-24
-
-
Beckert, B.1
-
5
-
-
35248846009
-
A program logic for handling Java Card's transaction mechanism
-
April
-
B. Beckert and W. Mostowski. A program logic for handling Java Card's transaction mechanism. In Proc. FASE, pages 246-260, April 2003.
-
(2003)
Proc. FASE
, pp. 246-260
-
-
Beckert, B.1
Mostowski, W.2
-
6
-
-
0001760770
-
Information transmission in sequential programs
-
Academic Press
-
E. S. Cohen. Information transmission in sequential programs. In Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
7
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Commun. ACM, 20(7):504-513, July 1977.
-
(1977)
Commun. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
11
-
-
0033751850
-
A semantic approach to secure information flow
-
R. Joshi and K. R. M. Leino. A semantic approach to secure information flow. Science of Computer Programming, 37(1-3):113-138, 2000.
-
(2000)
Science of Computer Programming
, vol.37
, Issue.1-3
, pp. 113-138
-
-
Joshi, R.1
Leino, K.R.M.2
-
12
-
-
79955163100
-
UMLsec: Extending UML for secure systems development
-
J. Jürjens. UMLsec: Extending UML for secure systems development. In Proc. U ML, pages 412-425, 2002.
-
(2002)
Proc. UML
, pp. 412-425
-
-
Jürjens, J.1
-
13
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
Jan.
-
A. C. Myers. JFlow: Practical mostly-static information flow control. In Proc. POPL, pages 228-241, Jan. 1999.
-
(1999)
Proc. POPL
, pp. 228-241
-
-
Myers, A.C.1
-
14
-
-
0036037318
-
Information flow inference for ML
-
Jan.
-
F. Pottier and V. Simonet. Information flow inference for ML. In Proc. POPL, pages 319-330, Jan. 2002.
-
(2002)
Proc. POPL
, pp. 319-330
-
-
Pottier, F.1
Simonet, V.2
-
17
-
-
0035276729
-
A per model of secure information flow in sequential programs
-
March
-
A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher-Order and Symbolic Computation, 14(1):59-91, March 2001.
-
(2001)
Higher-order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
18
-
-
14844366955
-
Verification of JavaCard programs
-
Institut für Informatik, Universität Augsburg, Germany
-
K. Stenzel. Verification of JavaCard programs. Technical report 2001-5, Institut für Informatik, Universität Augsburg, Germany, 2001.
-
(2001)
Technical Report
, vol.2001
, Issue.5
-
-
Stenzel, K.1
|