-
1
-
-
0032681509
-
A core calculus of dependency
-
January
-
M. Abadi, A. Banerjee, N. Heintze, and J. Riecke. A core calculus of dependency. In Proceedings of the Twenty-sixth ACM Symposium on Principles of Programming Languages, San Antonio, Texas, pages 147-160, January 1999.
-
(1999)
Proceedings of the Twenty-sixth ACM Symposium on Principles of Programming Languages, San Antonio, Texas
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.4
-
2
-
-
0032068338
-
The switchware active network architecture
-
May/June
-
D. Alexander, W. Arbaugh, M. Hicks, P. Kakkar, A. Keromytis, J. Moore, C. Gunder, S. Nettles, and J. Smith. The switchware active network architecture. IEEE Network, May/June 1998.
-
(1998)
IEEE Network
-
-
Alexander, D.1
Arbaugh, W.2
Hicks, M.3
Kakkar, P.4
Keromytis, A.5
Moore, J.6
Gunder, C.7
Nettles, S.8
Smith, J.9
-
3
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
The MITRE Corp., Bedford MA, May
-
D. Bell and L. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, The MITRE Corp., Bedford MA, May 1973.
-
(1973)
Technical Report
, vol.M74-244
-
-
Bell, D.1
LaPadula, L.2
-
4
-
-
0024772234
-
Kit: A study in operating system verification
-
W. R. Bevier. Kit: A study in operating system verification. IEEE Transactions on Software Engineering, 15(11):1382-1396, 1989.
-
(1989)
IEEE Transactions on Software Engineering
, vol.15
, Issue.11
, pp. 1382-1396
-
-
Bevier, W.R.1
-
5
-
-
0004096237
-
-
Prentice-Hall Series in Computer Science. Prentice-Hall Europe, London, UK, second edition
-
R. Bird. Introduction to Functional Programming using Haskell, Prentice-Hall Series in Computer Science. Prentice-Hall Europe, London, UK, second edition, 1998.
-
(1998)
Introduction to Functional Programming Using Haskell
-
-
Bird, R.1
-
6
-
-
84961731134
-
The Horus and Ensemble projects: Accomplishments and limitations
-
K. Birman, R. Constable, M. Hayden, C. Kreitz, O. Rodeh, R. van Renesse, and W. Vogels. The Horus and Ensemble projects: Accomplishments and limitations. In Proceedings of the DARPA Information Survivability Conference & Exposition (DISCEX '00), 2000.
-
(2000)
Proceedings of the DARPA Information Survivability Conference & Exposition (DISCEX '00)
-
-
Birman, K.1
Constable, R.2
Hayden, M.3
Kreitz, C.4
Rodeh, O.5
Van Renesse, R.6
Vogels, W.7
-
8
-
-
0004059519
-
-
PhD thesis, Columbia University
-
D. Espinosa. Semantic Lego, PhD thesis, Columbia University, 1995.
-
(1995)
Semantic Lego
-
-
Espinosa, D.1
-
9
-
-
77952413395
-
Security policies and security models
-
Los Alamitos, Ca., USA, Apr.. IEEE Computer Society Press
-
J. A. Goguen and J. Meseguer. Security policies and security models. In Proceedings of the 1982 Symposium on Security and Privacy (SSP '82), pages 11-20, Los Alamitos, Ca., USA, Apr. 1990. IEEE Computer Society Press.
-
(1990)
Proceedings of the 1982 Symposium on Security and Privacy (SSP '82)
, pp. 11-20
-
-
Goguen, J.A.1
Meseguer, J.2
-
10
-
-
28144458250
-
The Fox project: Advanced language technology for extensible systems
-
School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, January
-
R. Harper, P. Lee, and F. Pfenning. The Fox project: Advanced language technology for extensible systems. Technical Report CMU-CS-98-107, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, January 1998.
-
(1998)
Technical Report
, vol.CMU-CS-98-107
-
-
Harper, R.1
Lee, P.2
Pfenning, F.3
-
13
-
-
84976498283
-
Metacomputation-based compiler architecture
-
5th International Conference on the Mathematics of Program Construction, Ponte de Lima, Portugal. Springer-Verlag
-
W. Harrison and S. Kamin. Metacomputation-based compiler architecture. In 5th International Conference on the Mathematics of Program Construction, Ponte de Lima, Portugal, volume 1837 of Lecture Notes in Computer Science, pages 213-229. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1837
, pp. 213-229
-
-
Harrison, W.1
Kamin, S.2
-
14
-
-
0031701347
-
The SLam calculus: Programming with secrecy and integrity
-
ACM, editor, New York, NY, USA. ACM Press
-
N. Heintze and J. Riecke. The SLam calculus: programming with secrecy and integrity. In ACM, editor, Proceedings of the Twenty-fifth ACM Symposium on Principles of Programming Languages, pages 365-377, New York, NY, USA, 1998. ACM Press.
-
(1998)
Proceedings of the Twenty-fifth ACM Symposium on Principles of Programming Languages
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.2
-
15
-
-
0033751850
-
A semantic approach to secure information flow
-
May
-
R. Joshi and K. Leino. A semantic approach to secure information flow. Science of Computer Programming, 37(1-3): 113-138, May 2000.
-
(2000)
Science of Computer Programming
, vol.37
, Issue.1-3
, pp. 113-138
-
-
Joshi, R.1
Leino, K.2
-
16
-
-
0015672289
-
A note on the confinement problem
-
ACM press, Oct.
-
B. Lampson. A note on the confinement problem. In Communications of the ACM, pages 613-615. ACM press, Oct. 1973.
-
(1973)
Communications of the ACM
, pp. 613-615
-
-
Lampson, B.1
-
19
-
-
0029203616
-
Monad transformers and modular interpreters
-
New York, NY, USA. ACM Press
-
S. Liang, P. Hudak, and M. Jones. Monad transformers and modular interpreters. In 22nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1995, pages 333-343, New York, NY, USA, 1995. ACM Press.
-
(1995)
22nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1995
, pp. 333-343
-
-
Liang, S.1
Hudak, P.2
Jones, M.3
-
22
-
-
0023829319
-
Noninterference and the composability of security properties
-
D. McCullough. Noninterference and the composability of security properties. In P roc. IEEE Symposium on Security and Privacy, pages 177-187, 1988.
-
(1988)
P Roc. IEEE Symposium on Security and Privacy
, pp. 177-187
-
-
McCullough, D.1
-
23
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 79-93, 1994.
-
(1994)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 79-93
-
-
McLean, J.1
-
24
-
-
0000046942
-
A security flow control algorithm and its denotational semantics correctness proof
-
M. Mizuno and D. Schmidt. A security flow control algorithm and its denotational semantics correctness proof. Formal Aspects of Computing, 4(6A):727-754, 1992.
-
(1992)
Formal Aspects of Computing
, vol.4
, Issue.6 A
, pp. 727-754
-
-
Mizuno, M.1
Schmidt, D.2
-
25
-
-
0003457308
-
An abstract view of programming languages
-
Dept. of Computer Science, Edinburgh Univ.
-
E. Moggi. An abstract view of programming languages. Technical Report ECS-LFCS-90-113, Dept. of Computer Science, Edinburgh Univ., 1990.
-
(1990)
Technical Report
, vol.ECS-LFCS-90-113
-
-
Moggi, E.1
-
26
-
-
0026188821
-
Notions of computation and monads
-
E. Moggi. Notions of computation and monads. Information and Computation, 93(1):55-92, 1991.
-
(1991)
Information and Computation
, vol.93
, Issue.1
, pp. 55-92
-
-
Moggi, E.1
-
27
-
-
0347229432
-
A provably secure operating system: The system, its applications, and proof
-
SRI, May
-
P. Neumann, R. Boyer, R. Feiertag, K. Levitt, and L. Robinson. A provably secure operating system: The system, its applications, and proof. Technical Report CSL-116, SRI, May 1980.
-
(1980)
Technical Report
, vol.CSL-116
-
-
Neumann, P.1
Boyer, R.2
Feiertag, R.3
Levitt, K.4
Robinson, L.5
-
30
-
-
18844483225
-
A resumption monad transformer and its applications in the semantics of concurrency
-
Anogia, Crete
-
N. Papaspyrou. A resumption monad transformer and its applications in the semantics of concurrency. In Proceedings of the 3rd Panhellenic Logic Symposium, Anogia, Crete, 2001.
-
(2001)
Proceedings of the 3rd Panhellenic Logic Symposium
-
-
Papaspyrou, N.1
-
31
-
-
18844483225
-
A Resumption Monad Transformer and its Applications in the Semantics of Concurrency
-
Anogia, Crete, July 17-22
-
N. S. Papaspyrou. A Resumption Monad Transformer and its Applications in the Semantics of Concurrency. In Proceedings of the 3rd Panhellenic Logic Symposium, Anogia, Crete, July 17-22, 2001.
-
(2001)
Proceedings of the 3rd Panhellenic Logic Symposium
-
-
Papaspyrou, N.S.1
-
38
-
-
0020919435
-
Types, abstraction and parametric polymorphism
-
R. E. A. Mason, editor. North-Holland
-
J. C. Reynolds. Types, abstraction and parametric polymorphism. In R. E. A. Mason, editor, Information Processing 83, pages 513-523. North-Holland, 1983.
-
(1983)
Information Processing
, vol.83
, pp. 513-523
-
-
Reynolds, J.C.1
-
41
-
-
0020273088
-
Proof of separability: A verification technique for a class of security kernels
-
Berlin. Springer-Verlag
-
th International Symposium on Programming, pages 352-362, Berlin, 1982. Springer-Verlag.
-
(1982)
th International Symposium on Programming
, pp. 352-362
-
-
Rushby, J.1
-
43
-
-
0001421170
-
EROS: A fast capability system
-
Charleston, South Carolina
-
J. Shapiro, J. Smith, and D. Farber. EROS: a fast capability system. In Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP'99), pages 170-185, Charleston, South Carolina, 1999.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP'99)
, pp. 170-185
-
-
Shapiro, J.1
Smith, J.2
Farber, D.3
-
44
-
-
0034835461
-
A new type system for secure information flow
-
IEEE Computer Society Press
-
G. Smith. A new type system for secure information flow. In 14th IEEE Computer Security Foundations Workshop (CSFW '01), pages 115-125. IEEE Computer Society Press, 2001.
-
(2001)
14th IEEE Computer Security Foundations Workshop (CSFW '01)
, pp. 115-125
-
-
Smith, G.1
-
45
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
New York, Jan.
-
G. Smith and D. Volpano. Secure information flow in a multi-threaded imperative language. In Proceedings of the 25th ACM Symposium on Principles of Programming Languages, San Diego, California, pages 355-364, New York, Jan. 1998.
-
(1998)
Proceedings of the 25th ACM Symposium on Principles of Programming Languages, San Diego, California
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
47
-
-
0018983212
-
Specification and verification of the UCLA Unix security kernel
-
B. Walker, R. Kemmerer, and G. Popek. Specification and verification of the UCLA Unix security kernel. Communications of the ACM, 23(2):118-131, 1980.
-
(1980)
Communications of the ACM
, vol.23
, Issue.2
, pp. 118-131
-
-
Walker, B.1
Kemmerer, R.2
Popek, G.3
-
49
-
-
0034822370
-
Robust declassification
-
June
-
S. Zdancewic and A. Myers. Robust declassification. In Proceedings of 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, pages 15-23, June 2001.
-
(2001)
Proceedings of 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada
, pp. 15-23
-
-
Zdancewic, S.1
Myers, A.2
|