-
1
-
-
84957037045
-
Computational probabilistic non-interference
-
Proc. 7th European Symposium on Research in Computer Security (ESORICS), Springer
-
M. Backes and B. Pfitzmann. Computational probabilistic non-interference. In Proc. 7th European Symposium on Research in Computer Security (ESORICS), volume 2502 of Lecture Notes in Computer Science, pages 1-23. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2502
, pp. 1-23
-
-
Backes, M.1
Pfitzmann, B.2
-
4
-
-
0003400251
-
Secure computer systems: Unified exposition and multics interpretation
-
The Mitre Corporation
-
D. Bell and L. LaPadula. Secure computer systems: Unified exposition and multics interpretation. Computer Science Technical Report ESD-TR-75-306, The Mitre Corporation, 1976.
-
(1976)
Computer Science Technical Report
, vol.ESD-TR-75-306
-
-
Bell, D.1
LaPadula, L.2
-
5
-
-
0345275464
-
Quantitative analysis of the leakage of confidential data
-
Proc. Quantitative Aspects of Programming Languages, Elsevier
-
D. Clark, S. Hunt, and P. Malacaria. Quantitative analysis of the leakage of confidential data. In Proc. Quantitative Aspects of Programming Languages, volume 59 of Electronic Notes in Theoretical Computer Science. Elsevier, 2002.
-
(2002)
Electronic Notes in Theoretical Computer Science
, vol.59
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
7
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
9
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
R. Focardi and R. Gorrieri. The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23(9):550-571, 1997.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
10
-
-
84958046259
-
A uniform approach to the definition of security properties
-
Proc. 8th Symposium on Formal Methods Europe (FME 1999), Springer
-
R. Focardi and F. Martinelli. A uniform approach to the definition of security properties. In Proc. 8th Symposium on Formal Methods Europe (FME 1999), volume 1708 of Lecture Notes in Computer Science, pages 794-813. Springer, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1708
, pp. 794-813
-
-
Focardi, R.1
Martinelli, F.2
-
14
-
-
84974759639
-
Toward a mathematical foundation for information flow security
-
J. W. Gray III. Toward a mathematical foundation for information flow security. Journal of Computer Security, 1(3):255-295, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.3
, pp. 255-295
-
-
Gray III, J.W.1
-
15
-
-
0003843704
-
-
International Series in Computer Science, Prentice Hall, Hemel Hempstead
-
C. A. R. Hoare. Communicating Sequential Processes. International Series in Computer Science, Prentice Hall, Hemel Hempstead, 1985.
-
(1985)
Communicating Sequential Processes
-
-
Hoare, C.A.R.1
-
17
-
-
0015672289
-
A note on the confinement problem
-
B. W. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
18
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. 10th European Symposium on Programming (ESOP), pages 77-91, 2001.
-
(2001)
Proc. 10th European Symposium on Programming (ESOP)
, pp. 77-91
-
-
Laud, P.1
-
19
-
-
3543052976
-
Symmetric encryption in automatic analyses for confidentiality against active adversaries
-
P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. 25th IEEE Symposium on Security & Privacy, pages 71-85, 2004.
-
(2004)
Proc. 25th IEEE Symposium on Security & Privacy
, pp. 71-85
-
-
Laud, P.1
-
21
-
-
0004215089
-
-
Morgan Kaufmann Publishers, San Francisco
-
N. Lynch. Distributed Algorithms. Morgan Kaufmann Publishers, San Francisco, 1996.
-
(1996)
Distributed Algorithms
-
-
Lynch, N.1
-
22
-
-
84944059120
-
Unwinding possibilistic security properties
-
Proc. 6th European Symposium on Research in Computer Security (ESORICS), Springer
-
H. Mantel. Unwinding possibilistic security properties. In Proc. 6th European Symposium on Research in Computer Security (ESORICS), volume 1895 of Lecture Notes in Computer Science, pages 238-254. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1895
, pp. 238-254
-
-
Mantel, H.1
-
24
-
-
0023231848
-
Specifications for multi-level security and a hook-up property
-
D. McCullough. Specifications for multi-level security and a hook-up property. In Proc. 8th IEEE Symposium on Security & Privacy, pages 161-166, 1987.
-
(1987)
Proc. 8th IEEE Symposium on Security & Privacy
, pp. 161-166
-
-
McCullough, D.1
-
29
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184-200, 2001.
-
(2001)
Proc. 22nd IEEE Symposium on Security & Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
37
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
40
-
-
84945262623
-
Secure information flow and CPS
-
Proc. 10th European Symposium on Programming (ESOP), Springer
-
S. Zdancewic and A. C. Myers. Secure information flow and CPS. In Proc. 10th European Symposium on Programming (ESOP), volume 2028 of Lecture Notes in Computer Science, pages 46-61. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2028
, pp. 46-61
-
-
Zdancewic, S.1
Myers, A.C.2
|