-
2
-
-
84878558984
-
Protection in programming-language translations
-
[Aba98]. Proc. International Colloquium on Automata, Languages and Programming. Springer-Verlag, July
-
[Aba98] M. Abadi. Protection in programming-language translations. In Proc. International Colloquium on Automata, Languages and Programming, volume 1443 of LNCS, pages 868-883. Springer-Verlag, July 1998.
-
(1998)
LNCS
, vol.1443
, pp. 868-883
-
-
Abadi, M.1
-
3
-
-
0032681509
-
A core calculus of dependency
-
[ABHR99], January
-
[ABHR99] M. Abadi, A. Banerjee, N. Heintze, and J. Riecke. A core calculus of dependency. In Proc. ACM Symp. on Principles of Programming Languages, pages 147-160, January 1999.
-
(1999)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.4
-
4
-
-
17044429386
-
Stack-based access control and secure information flow
-
[BN05], March
-
[BN05] A. Banerjee and D. A. Naumann. Stack-based access control and secure information flow. Journal of Functional Programming, 15(2): 131-177, March 2005.
-
(2005)
Journal of Functional Programming
, vol.15
, Issue.2
, pp. 131-177
-
-
Banerjee, A.1
Naumann, D.A.2
-
5
-
-
0038487099
-
Intransitive noninterference for cryptographic purposes
-
[BP03], May
-
[BP03] M. Backes and B. Pfitzmann. Intransitive noninterference for cryptographic purposes. In Proc. IEEE Symp. on Security and Privacy, pages 140-153, May 2003.
-
(2003)
Proc. IEEE Symp. on Security and Privacy
, pp. 140-153
-
-
Backes, M.1
Pfitzmann, B.2
-
7
-
-
0345275464
-
Quantitative analysis of the leakage of confidential data
-
[CHM02]. QAPL'01, Proc. Quantitative Aspects of Programming Languages. Elsevier
-
[CHM02] D. Clark, S. Hunt, and P. Malacaria. Quantitative analysis of the leakage of confidential data. In QAPL'01, Proc. Quantitative Aspects of Programming Languages, volume 59 of ENTCS. Elsevier, 2002.
-
(2002)
ENTCS
, vol.59
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
12
-
-
84976675687
-
Information transmission in computational systems
-
[Coh77]
-
[Coh77] E. S. Cohen. Information transmission in computational systems. ACM SIGOPS Operating Systems Review, 11 (5): 133-139, 1977.
-
(1977)
ACM SIGOPS Operating Systems Review
, vol.11
, Issue.5
, pp. 133-139
-
-
Cohen, E.S.1
-
13
-
-
0001760770
-
Information transmission in sequential programs
-
[Coh78]. R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors. Academic Press
-
[Coh78] E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
14
-
-
0033718531
-
Confidentiality for mobile code: The case of a simple payment protocol
-
[DG00], July
-
[DG00] M. Dam and P. Giambiagi. Confidentiality for mobile code: The case of a simple payment protocol. In Proc. IEEE Computer Security Foundations Workshop, pages 233-244, July 2000.
-
(2000)
Proc. IEEE Computer Security Foundations Workshop
, pp. 233-244
-
-
Dam, M.1
Giambiagi, P.2
-
15
-
-
28144434273
-
Information flow control for cryptographic applets
-
[DG03], October
-
[DG03] M. Dam and P. Giambiagi. Information flow control for cryptographic applets. Presentation at the Dagstuhl Seminar on Language-Based Security, October 2003. www.dagstuhl.de/03411/Materials/.
-
(2003)
Dagstuhl Seminar on Language-based Security
-
-
Dam, M.1
Giambiagi, P.2
-
18
-
-
84974776068
-
A classification of security properties for process algebras
-
[FG95]
-
[FG95] R. Focardi and R. Gorrieri. A classification of security properties for process algebras. J. Computer Security, 3(1):5-33, 1995.
-
(1995)
J. Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
19
-
-
24644477761
-
Bridging language-based and process calculi security
-
[FRS05]. Proc. Foundations of Software Science and Computation Structure. Springer-Verlag, April
-
[FRS05] R. Focardi, S. Rossi, and A. Sabelfeld. Bridging language-based and process calculi security. In Proc. Foundations of Software Science and Computation Structure, volume 3441 of LNCS, pages 299-315. Springer-Verlag, April 2005.
-
(2005)
LNCS
, vol.3441
, pp. 299-315
-
-
Focardi, R.1
Rossi, S.2
Sabelfeld, A.3
-
20
-
-
0030708182
-
Providing flexibility in information flow control for object-oriented systems
-
[FSBJ97], May
-
[FSBJ97] E. Ferrari, P. Samarati, E. Bertino, and S. Jajodia. Providing flexibility in information flow control for object-oriented systems. In Proc. IEEE Symp. on Security and Privacy, pages 130-140, May 1997.
-
(1997)
Proc. IEEE Symp. on Security and Privacy
, pp. 130-140
-
-
Ferrari, E.1
Samarati, P.2
Bertino, E.3
Jajodia, S.4
-
21
-
-
35248815514
-
On the secure implementation of security protocols
-
[GD03]. Proc. European Symp. on Programming. Springer-Verlag, April
-
[GD03] P. Giambiagi and M. Dam. On the secure implementation of security protocols. In Proc. European Symp. on Programming, volume 2618 of LNCS, pages 144-158. Springer-Verlag, April 2003.
-
(2003)
LNCS
, vol.2618
, pp. 144-158
-
-
Giambiagi, P.1
Dam, M.2
-
24
-
-
1442287656
-
Abstract noninterference: Parameterizing non-interference by abstract interpretation
-
[GM04], January
-
[GM04] R. Giacobazzi and I. Mastroeni. Abstract noninterference: Parameterizing non-interference by abstract interpretation. In Proc. ACM Symp. on Principles of Programming Languages, pages 186-197, January 2004.
-
(2004)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 186-197
-
-
Giacobazzi, R.1
Mastroeni, I.2
-
25
-
-
24644453685
-
Adjoining declassification and attack models by abstract interpretation
-
[GM05]. Proc. European Symp. on Programming. Springer-Verlag, April
-
[GM05] R. Giacobazzi and I. Mastroeni. Adjoining declassification and attack models by abstract interpretation. In Proc. European Symp. on Programming, volume 3444 of LNCS, pages 295-310. Springer-Verlag, April 2005.
-
(2005)
LNCS
, vol.3444
, pp. 295-310
-
-
Giacobazzi, R.1
Mastroeni, I.2
-
27
-
-
0033751850
-
A semantic approach to secure information flow
-
[JL00]
-
[JL00] R. Joshi and K. R. M. Leino. A semantic approach to secure information flow. Science of Computer Programming, 37(1-3): 113-138, 2000.
-
(2000)
Science of Computer Programming
, vol.37
, Issue.1-3
, pp. 113-138
-
-
Joshi, R.1
Leino, K.R.M.2
-
28
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
[Lau01]. Proc. European Symp. on Programming. Springer-Verlag, April
-
[Lau01] P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. European Symp. on Programming, volume 2028 of LNCS, pages 77-91. Springer-Verlag, April 2001.
-
(2001)
LNCS
, vol.2028
, pp. 77-91
-
-
Laud, P.1
-
29
-
-
35248840989
-
Handling encryption in an analysis for secure information flow
-
[Lau03]. Proc. European Symp. on Programming. Springer-Verlag, April
-
[Lau03] P. Laud. Handling encryption in an analysis for secure information flow. In Proc. European Symp. on Programming, volume 2618 of LNCS, pages 159-173. Springer-Verlag, April 2003.
-
(2003)
LNCS
, vol.2618
, pp. 159-173
-
-
Laud, P.1
-
30
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
[LMMS98], November
-
[LMMS98] P. Lincoln, J. C. Mitchell, M. Mitchell, and A. Sccdrov. A probabilistic poly-time framework for protocol analysis. In ACM Conference on Computer and Communications Security, pages 112-121, November 1998.
-
(1998)
ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.C.2
Mitchell, M.3
Sccdrov, A.4
-
34
-
-
0033701251
-
Possibilistic definitions of security - An assembly kit
-
[Man00], July
-
[Man00] H. Mantel. Possibilistic definitions of security - An assembly kit -. In Proc. IEEE Computer Security Foundations Workshop, pages 185-199, July 2000.
-
(2000)
Proc. IEEE Computer Security Foundations Workshop
, pp. 185-199
-
-
Mantel, H.1
-
35
-
-
84881123660
-
Information flow control and applications - Bridging a gap
-
[Man01]. Proc. Formal Methods Europe. Springer-Verlag, March
-
[Man01] H. Mantel. Information flow control and applications - Bridging a gap. In Proc. Formal Methods Europe, volume 2021 of LNCS, pages 153-172. Springer-Verlag, March 2001.
-
(2001)
LNCS
, vol.2021
, pp. 153-172
-
-
Mantel, H.1
-
36
-
-
0027684079
-
On abstraction and the expressive power of programming languages
-
[Mit93]
-
[Mit93] J. C. Mitchell. On abstraction and the expressive power of programming languages. Science of Computer Programming, 212:141-163, 1993.
-
(1993)
Science of Computer Programming
, vol.212
, pp. 141-163
-
-
Mitchell, J.C.1
-
37
-
-
84945290421
-
Probabilistic polynomial-time process calculus and security protocol analysis
-
[Mit01]. Proc. European Symp. on Programming. Springer-Verlag, April
-
[Mit01] J. C. Mitchell. Probabilistic polynomial-time process calculus and security protocol analysis. In Proc. European Symp. on Programming, volume 2028 of LNCS, pages 23-29. Springer-Verlag, April 2001.
-
(2001)
LNCS
, vol.2028
, pp. 23-29
-
-
Mitchell, J.C.1
-
39
-
-
0141528662
-
A unifying approach to the security of distributed and multi-threaded programs
-
[MS03], September
-
[MS03] H. Mantel and A. Sabelfeld. A unifying approach to the security of distributed and multi-threaded programs. J. Computer Security, 11(4):615-676, September 2003.
-
(2003)
J. Computer Security
, vol.11
, Issue.4
, pp. 615-676
-
-
Mantel, H.1
Sabelfeld, A.2
-
40
-
-
35048815139
-
Controlled downgrading based on intransitive (non)interference
-
[MS04]. Proc. Asian Symp. on Programming Languages and Systems. Springer-Verlag, November
-
[MS04] H. Mantel and D. Sands. Controlled downgrading based on intransitive (non)interference. In Proc. Asian Symp. on Programming Languages and Systems, volume 3302 of LNCS, pages 129-145. Springer-Verlag, November 2004.
-
(2004)
LNCS
, vol.3302
, pp. 129-145
-
-
Mantel, H.1
Sands, D.2
-
43
-
-
0042361083
-
Non-deterministic admissible interference
-
[Mul00]
-
[Mul00] J. Mullins. Non-deterministic admissible interference. J. of Universal Computer Science, 6(11):1054-1070, 2000.
-
(2000)
J. of Universal Computer Science
, vol.6
, Issue.11
, pp. 1054-1070
-
-
Mullins, J.1
-
44
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
[Mye99], January
-
[Mye99] A. C. Myers. JFlow: Practical mostly-static information flow control. In Proc. ACM Symp. on Principles of Programming Languages, pages 228-241, January 1999.
-
(1999)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 228-241
-
-
Myers, A.C.1
-
45
-
-
12844283698
-
Jif: Java information flow
-
+04], July
-
+04] A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001-2004.
-
(2001)
Software Release
-
-
Myers, A.C.1
Zheng, L.2
Zdancewic, S.3
Chong, S.4
Nystrom, N.5
-
47
-
-
0029228214
-
Absorbing covers and intransitive noninterference
-
[Pin95], May
-
[Pin95] S. Pinsky. Absorbing covers and intransitive noninterference. In Proc. IEEE Symp. on Security and Privacy, pages 102-113, May 1995.
-
(1995)
Proc. IEEE Symp. on Security and Privacy
, pp. 102-113
-
-
Pinsky, S.1
-
48
-
-
0000230630
-
LCF considered as a programming language
-
[Plo77], December
-
[Plo77] G. D. Plotkin. LCF considered as a programming language. Theoretical Computer Science, 5(1):223-255, December 1977.
-
(1977)
Theoretical Computer Science
, vol.5
, Issue.1
, pp. 223-255
-
-
Plotkin, G.D.1
-
52
-
-
0003502331
-
Noninterference, transitivity, and channel-control security policies
-
[Rus92], SRI International
-
[Rus92] J. M. Rushby. Noninterference, transitivity, and channel-control security policies. Technical Report CSL-92-02, SRI International, 1992.
-
(1992)
Technical Report
, vol.CSL-92-02
-
-
Rushby, J.M.1
-
53
-
-
84949243805
-
Mathematical models of computer security - Tutorial lectures
-
[Rya01]. R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design. Springer-Verlag
-
[Rya01] P. Ryan. Mathematical models of computer security - tutorial lectures. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 1-62. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2171
, pp. 1-62
-
-
Ryan, P.1
-
54
-
-
84887903550
-
Lambda calculi and linear speedups
-
[SGM02]. The essence of computation: complexity, analysis, transformation. Springer-Verlag
-
[SGM02] D. Sands, J. Gustavsson, and A. Moran. Lambda calculi and linear speedups. In The essence of computation: complexity, analysis, transformation, volume 2566 of LNCS, pages 60-82. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2566
, pp. 60-82
-
-
Sands, D.1
Gustavsson, J.2
Moran, A.3
-
56
-
-
35048828759
-
A model for delimited information release
-
[SM04]. Proc. International Symp. on Software Security (ISSS'03). Springer-Verlag, October
-
[SM04] A. Sabelfeld and A. C. Myers. A model for delimited information release. In Proc. International Symp. on Software Security (ISSS'03), volume 3233 of LNCS, pages 174-191. Springer-Verlag, October 2004.
-
(2004)
LNCS
, vol.3233
, pp. 174-191
-
-
Sabelfeld, A.1
Myers, A.C.2
-
58
-
-
0035276729
-
A per model of secure information flow in sequential programs
-
[SS01], March
-
[SS01] A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher Order and Symbolic Computation, 14(1):59-91, March 2001.
-
(2001)
Higher Order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
59
-
-
24644494868
-
Designing a security-typed language with certificate-based declassification
-
[TZ05]. Proc. European Symp. on Programming, Springer-Verlag, April
-
[TZ05] S. Tse and S. Zdancewic. Designing a security-typed language with certificate-based declassification. In Proc. European Symp. on Programming, volume 3444 of LNCS, pages 279-294. Springer-Verlag, April 2005.
-
(2005)
LNCS
, vol.3444
, pp. 279-294
-
-
Tse, S.1
Zdancewic, S.2
-
62
-
-
0030370740
-
A sound type system for secure flow analysis
-
[VSI96]
-
[VSI96] D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3): 167-187, 1996.
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|