-
1
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
MITRE Corp. Badford, MA
-
D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, MITRE Corp. Badford, MA, 1973.
-
(1973)
Technical Report
, vol.M74-244
-
-
Bell, D.E.1
LaPadula, L.J.2
-
3
-
-
84937553676
-
Static analysis for secrecy and non-interference in networks of processes
-
Proc. of PaCT'01. Springer-Verlag
-
C. Bodei, P. Degano, F. Nielson, and H.R. Nielson. Static analysis for secrecy and non-interference in networks of processes. In Proc. of PaCT'01, volume 2127 of Lecture Notes in Computer Science, pages 27-41. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2127
, pp. 27-41
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
4
-
-
0036555709
-
Information flow for algol-like languages
-
D. Clark, C. Hankin, and S. Hunt. Information flow for algol-like languages. Computer Languages, 28(1):3-28, 2002.
-
(2002)
Computer Languages
, vol.28
, Issue.1
, pp. 3-28
-
-
Clark, D.1
Hankin, C.2
Hunt, S.3
-
5
-
-
0345275464
-
Quantitative analysis of the leakage of confidential data
-
Workshop on Quantitative Aspects of Programming Laquages (QAPL '01). Elsevier, Amsterdam
-
D. Clark, S. Hunt, and P. Malacaria. Quantitative analysis of the leakage of confidential data. In Workshop on Quantitative Aspects of Programming Laquages (QAPL '01), volume 59 of Electronic Notes in Theoretical Computer Science. Elsevier, Amsterdam, 2001.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.59
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
6
-
-
84976675687
-
Information transmission in computational systems
-
E. S. Cohen. Information transmission in computational systems. ACM SIGOPS Operating System Review, 11(5):133-139, 1977.
-
(1977)
ACM SIGOPS Operating System Review
, vol.11
, Issue.5
, pp. 133-139
-
-
Cohen, E.S.1
-
7
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
ACM Press, New York
-
P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proc. of Conf. Record of the 4th ACM Symp. on Principles of Programming Languages (POPL '77), pages 238-252. ACM Press, New York, 1977.
-
(1977)
Proc. of Conf. Record of the 4th ACM Symp. on Principles of Programming Languages (POPL '77)
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
9
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-242, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-242
-
-
Denning, D.E.1
-
10
-
-
0017517624
-
Certification of programs for secure information flow
-
D. E. Denning and P. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.2
-
11
-
-
0001052191
-
A unifying view of abstract domain design
-
G. Filé, R. Giacobazzi, and F. Ranzato. A unifying view of abstract domain design. ACM Comput. Surv., 28(2):333-336, 1996.
-
(1996)
ACM Comput. Surv.
, vol.28
, Issue.2
, pp. 333-336
-
-
Filé, G.1
Giacobazzi, R.2
Ranzato, F.3
-
12
-
-
84974776068
-
A classification of security properties for process algebras
-
R. Focardi and R. Gorrieri. A classification of security properties for process algebras. Journal of Computer security, 3(1):5-33, 1995.
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
15
-
-
84890021811
-
Incompleteness, counterexamples and refinements in abstract model-checking
-
P. Cousot, editor, Proc. of The 8th Internat. Static Analysis Symp. (SAS'01). Springer-Ver lag
-
R. Giacobazzi and E. Quintarelli. Incompleteness, counterexamples and refinements in abstract model-checking. In P. Cousot, editor, Proc. of The 8th Internat. Static Analysis Symp. (SAS'01), volume 2126 of Lecture Notes in Computer Science, pages 356-373. Springer-Ver lag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2126
, pp. 356-373
-
-
Giacobazzi, R.1
Quintarelli, E.2
-
16
-
-
1442284557
-
Refining and compressing abstract domains
-
P. Degano, R. Gorrieri, and A. Marchetti-Spaccamela, editors, Proc. of the 24th Internat. Colloq. on Automata, Languages and Programming (ICALP '97). Springer-Verlag, Berlin
-
R. Giacobazzi and P. Ranzato. Refining and compressing abstract domains. In P. Degano, R. Gorrieri, and A. Marchetti-Spaccamela, editors, Proc. of the 24th Internat. Colloq. on Automata, Languages and Programming (ICALP '97), volume 1256 of Lecture Notes in Computer Science, pages 771-781. Springer-Verlag, Berlin, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1256
, pp. 771-781
-
-
Giacobazzi, R.1
Ranzato, P.2
-
17
-
-
0000651947
-
Making abstract interpretations complete
-
R. Giacobazzi, F. Ranzato, and F. Scozzari. Making abstract interpretations complete. J. of the ACM., 47(2):361-416, 2000.
-
(2000)
J. of the ACM.
, vol.47
, Issue.2
, pp. 361-416
-
-
Giacobazzi, R.1
Ranzato, F.2
Scozzari, F.3
-
20
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
Programming Languages and Systems, 10th European Symp. On Programming, ESOP. Springer-Verlag
-
P. Laud. Semantics and program analysis of computationally secure information flow. In Programming Languages and Systems, 10th European Symp. On Programming, ESOP, volume 2028 of Lecture Notes in Computer Science, pages 77-91. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2028
, pp. 77-91
-
-
Laud, P.1
-
22
-
-
0033701251
-
Possibilistic definitions of security - An assemply kit
-
IEEE Computer Society Press
-
H. Mantel. Possibilistic definitions of security - an assemply kit -. In Proc. of the IEEE Computer Security Foundations Workshop, pages 185-199. IEEE Computer Society Press, 2000.
-
(2000)
Proc. of the IEEE Computer Security Foundations Workshop
, pp. 185-199
-
-
Mantel, H.1
-
23
-
-
84974747891
-
Proving noninterference and functional correcteness using traces
-
J. McLean. Proving noninterference and functional correcteness using traces. Journal of Computer security, 1(1):37-58, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.1
, pp. 37-58
-
-
McLean, J.1
-
24
-
-
35048869628
-
Strong preservation as completeness in abstract interpretation
-
D. Schmidt, editor, Proc. of the 13th European Symposium on Programming (ESOP'04). Springer-Verlag
-
F. Ranzato and F. Tapparo. Strong preservation as completeness in abstract interpretation. In D. Schmidt, editor, Proc. of the 13th European Symposium on Programming (ESOP'04), volume 2986 of Lecture Notes in Computer Science, pages 18-32. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2986
, pp. 18-32
-
-
Ranzato, F.1
Tapparo, F.2
-
25
-
-
84949243805
-
Mathematical models of computer security - Tutorial lectures
-
R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design. Springer-Verlag
-
P. Ryan. Mathematical models of computer security - tutorial lectures. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of Lecture Notes in Computer Science, pages 1-62. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2171
, pp. 1-62
-
-
Ryan, P.1
-
28
-
-
0035276729
-
A PER model of secure information flow in sequential programs
-
A. Sabelfeld and D. Sands. A PER model of secure information flow in sequential programs. Higher-Order and Symbolic Computation, 14(1):59-91, 2001.
-
(2001)
Higher-order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
29
-
-
0003132401
-
Static enforcement of security with types
-
ACM Press, New York
-
C. Skalka and S. Smith. Static enforcement of security with types. In ICFP'00, pages 254-267. ACM Press, New York, 2000.
-
(2000)
ICFP'00
, pp. 254-267
-
-
Skalka, C.1
Smith, S.2
-
30
-
-
84957709924
-
Safety versus secrecy
-
Proc. of the 6th Static Analysis Symp. (SAS'99). Springer-Verlag
-
D. Volpano. Safety versus secrecy. In Proc. of the 6th Static Analysis Symp. (SAS'99), volume 1694 of Lecture Notes in Computer Science, pages 303-311. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1694
, pp. 303-311
-
-
Volpano, D.1
-
31
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(2,3): 167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|