-
1
-
-
0033702592
-
Transforming out timing leaks
-
J. AAAT, Transforming out timing leaks, POPL'00 (2000) 40-53.
-
(2000)
POPL'00
, pp. 40-53
-
-
Aaat, J.1
-
2
-
-
84976840591
-
An axiomatic approach to information flow in programs
-
G. R. ANDREWS, R.P. REITMAN, An axiomatic approach to information flow in programs, ACM TOPLAS, Vol. 2 No. 1 (1980) 56-76.
-
(1980)
ACM TOPLAS
, vol.2
, Issue.1
, pp. 56-76
-
-
Andrews, G.R.1
Reitman, R.P.2
-
4
-
-
4944242009
-
Modelling downgrading in information flow security
-
A. BOSSI, C. PIAZZA, S. Rossi, Modelling downgrading in information flow security, CSFW'04 (2004).
-
(2004)
CSFW'04
-
-
Bossi, A.1
Piazza, C.2
Rossi, S.3
-
5
-
-
28144464370
-
ULM, a core programming model for global computing
-
ESOP'04
-
G. BOUDOL, ULM, a core programming model for global computing, ESOP'04, Lecture Notes in Comput. Sci. 2986 (2004) 234-248.
-
(2004)
Lecture Notes in Comput. Sci.
, vol.2986
, pp. 234-248
-
-
Boudol, G.1
-
6
-
-
0037014243
-
Non-interference for concurrent programs and thread systems
-
G. BOUDOL, I. CASTELLANI, Non-interference for concurrent programs and thread systems, Theoretical Comput. Sci. Vol. 281, No. 1 (2002) 109-130.
-
(2002)
Theoretical Comput. Sci.
, vol.281
, Issue.1
, pp. 109-130
-
-
Boudol, G.1
Castellani, I.2
-
7
-
-
33646723032
-
Quantified interference: Information theory and information flow
-
D. CLARK, S. HUNT, P. MALACARIA, Quantified interference: information theory and information flow, WITS'04 (2004).
-
(2004)
WITS'04
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
10
-
-
17044427985
-
A monadic analysis of information flow security with mutable state
-
K. CRARY, A. KLIGER, F. PFENNING, A monadic analysis of information flow security with mutable state, J. of Functional Programming, Vol. 15 No. 2 (2005) 249-291.
-
(2005)
J. of Functional Programming
, vol.15
, Issue.2
, pp. 249-291
-
-
Crary, K.1
Kliger, A.2
Pfenning, F.3
-
11
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. DENNING, A lattice model of secure information flow, CACM Vol. 19 No. 5 (1976) 236-243.
-
(1976)
CACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
13
-
-
0030708182
-
Providing flexibility in information flow control for objectoriented systems
-
E. FERRARI, P. SAMARATI, E. BERTINO, S. JAJODIA, Providing flexibility in information flow control for objectoriented systems, IEEE Symp. on Security and Privacy (1997) 130-140.
-
(1997)
IEEE Symp. on Security and Privacy
, pp. 130-140
-
-
Ferrari, E.1
Samarati, P.2
Bertino, E.3
Jajodia, S.4
-
14
-
-
84974776068
-
A classification of security properties for process algebras
-
R. FOCARDI, R. GORRIERI, A classification of security properties for process algebras, J. of Computer Security, Vol. 3 No. 1 (1995) 5-33.
-
(1995)
J. of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
15
-
-
31744437624
-
Information flow security in dynamic contexts
-
R. FOCARDI, S. ROSSI, Information flow security in dynamic contexts, CSFW'01 (2001) 307-319.
-
(2001)
CSFW'01
, pp. 307-319
-
-
Focardi, R.1
Rossi, S.2
-
17
-
-
0031701347
-
The SLam calculus: Programming with secrecy and integrity
-
N. HEINTZE, J. RIECKE, The SLam calculus: programming with secrecy and integrity, POPL'98 (1998) 365-377.
-
(1998)
POPL'98
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.2
-
19
-
-
0015672289
-
A note on the confinement problem
-
B.W. LAMPSON, A note on the confinement problem, CACM Vol. 16 No. 10 (1973) 613-615.
-
(1973)
CACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
20
-
-
0001097061
-
The mechanical evaluation of expressions
-
P. J. LANDIN, The mechanical evaluation of expressions, Computer Journal Vol. 6 (1964) 308-320.
-
(1964)
Computer Journal
, vol.6
, pp. 308-320
-
-
Landin, P.J.1
-
21
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
ESOP'01
-
P. LAUD, Semantics and program analysis of computationally secure information flow, ESOP'01, Lecture Notes in Comput. Sci. 2028 (2001) 77-91.
-
(2001)
Lecture Notes in Comput. Sci.
, vol.2028
, pp. 77-91
-
-
Laud, P.1
-
22
-
-
35248840989
-
Handling encryption in an analysis for secure information flow
-
ESOP'03
-
P. LAUD, Handling encryption in an analysis for secure information flow, ESOP'03, Lecture Notes in Comput. Sci. 2618 (2003) 159-173.
-
(2003)
Lecture Notes in Comput. Sci.
, vol.2618
, pp. 159-173
-
-
Laud, P.1
-
24
-
-
28144461940
-
Downgrading policies and relaxed noninterference
-
P. LI, S. ZDANCEWIC, Downgrading policies and relaxed noninterference, POPL'05 (2005) 158-170.
-
(2005)
POPL'05
, pp. 158-170
-
-
Li, P.1
Zdancewic, S.2
-
25
-
-
2042514961
-
Semantic models of information flow
-
G. LOWE, Semantic models of information flow, Theoretical Comput. Sci. 315 (2004) 209-256.
-
(2004)
Theoretical Comput. Sci.
, vol.315
, pp. 209-256
-
-
Lowe, G.1
-
27
-
-
35048815139
-
Controlled declassification based on intransitive noninterference
-
APLAS'04
-
H. MANTEL, D. SANDS, Controlled declassification based on intransitive noninterference, APLAS'04, Lecture Notes in Comput. Sci. 3302 (2004) 129-145.
-
(2004)
Lecture Notes in Comput. Sci.
, vol.3302
, pp. 129-145
-
-
Mantel, H.1
Sands, D.2
-
29
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
A. MYERS, JFlow: practical mostly-static information flow control, POPL'99 (1999).
-
(1999)
POPL'99
-
-
Myers, A.1
-
31
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
A. C. MYERS, B. LISKOV, Protecting privacy using the decentralized label model, ACM Trans. on Soft. Eng. and Methodology, Vol. 9 No. 4 (2000) 410-442.
-
(2000)
ACM Trans. on Soft. Eng. and Methodology
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
-
33
-
-
0348017041
-
Information flow inference for ML
-
F. POTTIER, V. SIMONET, Information flow inference for ML, ACM TOPLAS Vol. 25 No. 1 (2003) 117-158.
-
(2003)
ACM TOPLAS
, vol.25
, Issue.1
, pp. 117-158
-
-
Pottier, F.1
Simonet, V.2
-
35
-
-
0003502331
-
Noninterference, transitivity, and channel-control security policies
-
Comput. Sci. Lab. SRI International
-
J. RUSHBY, Noninterference, transitivity, and channel-control security policies, Comput. Sci. Lab. SRI International, Tech. Rep. CSL-92-02 (1992).
-
(1992)
Tech. Rep.
, vol.CSL-92-02
-
-
Rushby, J.1
-
36
-
-
0034829266
-
Non-interference, who needs it?
-
P. RYAN, J. MCLEAN, J. MILLEN, V. GLIGOR, Non-interference, who needs it?, CSFW'01 (2001).
-
(2001)
CSFW'01
-
-
Ryan, P.1
Mclean, J.2
Millen, J.3
Gligor, V.4
-
37
-
-
0033700286
-
Probabilistic noninterference for multi-threaded programs
-
A. SABELFELD, D. SANDS, Probabilistic noninterference for multi-threaded programs, CSFW'00 (2000).
-
(2000)
CSFW'00
-
-
Sabelfeld, A.1
Sands, D.2
-
39
-
-
4944241159
-
A model for delimited information release
-
Intern. Symp. on Software Security, to appear
-
A. SABELFELD, A.C. MYERS, A model for delimited information release, Intern. Symp. on Software Security, Lecture Notes in Comput. Sci. to appear (2003).
-
(2003)
Lecture Notes in Comput. Sci.
-
-
Sabelfeld, A.1
Myers, A.C.2
-
40
-
-
0027699087
-
Lattice-based access control models
-
R. S. SANDHU, Lattice-based access control models, IEEE Computer Vol. 26 No. 11 (1993) 9-19.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
41
-
-
24344486699
-
The Flow Caml system: Documentation and user's manual
-
V. SIMONET, The Flow Caml system: documentation and user's manual, INRIA Tech. Rep. 0282 (2003).
-
(2003)
INRIA Tech. Rep.
, vol.282
-
-
Simonet, V.1
-
42
-
-
0034835461
-
A new type system for secure information flow
-
G. SMITH, A new type system for secure information flow, CSFW'01 (2001).
-
(2001)
CSFW'01
-
-
Smith, G.1
-
43
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
G. SMITH, D. VOLPANO, Secure information flow in a multi-threaded imperative language, POPL'98 (1998).
-
(1998)
POPL'98
-
-
Smith, G.1
Volpano, D.2
-
45
-
-
24644494868
-
A design for a security-typed language with certificate-based declassification
-
ESOP'05, to appear
-
S. TSE, S. ZDANCEWIC, A design for a security-typed language with certificate-based declassification, ESOP'05, Lecture Notes in Comput. Sci. to appear (2005).
-
(2005)
Lecture Notes in Comput. Sci.
-
-
Tse, S.1
Zdancewic, S.2
-
46
-
-
0033683194
-
Secure introduction of one-way functions
-
D. VOLPANO, Secure introduction of one-way functions, CSFW'00 (2000) 246-254.
-
(2000)
CSFW'00
, pp. 246-254
-
-
Volpano, D.1
-
47
-
-
0030673701
-
Eliminating covert flows with minimum typings
-
D. VOLPANO, G. SMITH, Eliminating covert flows with minimum typings, CSFW'97 (1997) 156-168.
-
(1997)
CSFW'97
, pp. 156-168
-
-
Volpano, D.1
Smith, G.2
-
48
-
-
0031633213
-
Probabilistic noninterference in a concurrent language
-
D. VOLPANO, G. SMITH, Probabilistic noninterference in a concurrent language, CSFW'98 (1998) 34-43.
-
(1998)
CSFW'98
, pp. 34-43
-
-
Volpano, D.1
Smith, G.2
-
49
-
-
0033705210
-
Verifying secrets and relative secrecy
-
D. VOLPANO, G. SMITH, Verifying secrets and relative secrecy, POPL'00 (2000) 268-276.
-
(2000)
POPL'00
, pp. 268-276
-
-
Volpano, D.1
Smith, G.2
-
50
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. VOLPANO, G. SMITH, C. IRVINE, A sound type system for secure flow analysis, J. of Computer Security, Vol. 4, No 3 (1996) 167-187.
-
(1996)
J. of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
51
-
-
0003025818
-
A syntactic approach to type soundness
-
A. WRIGHT, M. FELLEISEN, A syntactic approach to type soundness, Information and Computation Vol. 115 No. 1 (1994) 38-94.
-
(1994)
Information and Computation
, vol.115
, Issue.1
, pp. 38-94
-
-
Wright, A.1
Felleisen, M.2
-
52
-
-
4944241703
-
A type system for robust declassification
-
MFPS'03
-
S. ZDANCEWIC, A type system for robust declassification, MFPS'03, ENTCS Vol. 83 (2003).
-
(2003)
ENTCS
, vol.83
-
-
Zdancewic, S.1
-
53
-
-
51749111025
-
Challenges for information-flow security
-
S. ZDANCEWIC, Challenges for information-flow security, PLID'04 (2004).
-
(2004)
PLID'04
-
-
Zdancewic, S.1
-
54
-
-
0036761582
-
Secure information how via linear continuations
-
S. ZDANCEWIC, A.C. MYERS, Secure information How via linear continuations, HOSC Vol. 15 No. 2-3 (2002) 209-234.
-
(2002)
HOSC
, vol.15
, Issue.2-3
, pp. 209-234
-
-
Zdancewic, S.1
Myers, A.C.2
|