-
1
-
-
0032681509
-
A core calculus of dependency
-
M. Abadi, A. Banerjee, N. Heintze and J. Riecke, A core calculus of dependency, in: Proc. ACM Symp. on Principles of Programming Languages, 1999, pp. 147-160.
-
(1999)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.4
-
5
-
-
0003400255
-
Integrity considerations for secure computer systems
-
USAF Electronic Systems Division, Bedford, MA, Apr. (Also available through National Technical Information Service, Springfield Va., NTIS AD-A039324.)
-
K.J. Biba, Integrity considerations for secure computer systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, Apr. 1977. (Also available through National Technical Information Service, Springfield Va., NTIS AD-A039324.)
-
(1977)
Technical Report ESD-TR-76-372
-
-
Biba, K.J.1
-
9
-
-
0345275464
-
Quantitative analysis of the leakage of confidential data
-
Proc. Quantitative Aspects of Programming Languages, Elsevier
-
D. Clark, S. Hunt and P. Malacaria, Quantitative analysis of the leakage of confidential data, in: Proc. Quantitative Aspects of Programming Languages, Volume 59 of ENTCS, Elsevier, 2002.
-
(2002)
ENTCS
, vol.59
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
11
-
-
0001760770
-
Information transmission in sequential programs
-
R.A. DeMillo, D.P. Dobkin, A.K. Jones and R.J. Lipton, eds, Academic Press
-
E.S. Cohen, Information transmission in sequential programs, in: Foundations of Secure Computation, R.A. DeMillo, D.P. Dobkin, A.K. Jones and R.J. Lipton, eds, Academic Press, 1978, pp. 297-335.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
13
-
-
0016949746
-
A lattice model of secure information flow
-
D.E. Denning, A lattice model of secure information flow, Comm. of the ACM 19(5) (1976), 236-243.
-
(1976)
Comm. of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
15
-
-
0017517624
-
Certification of programs for secure information flow
-
D.E. Denning and P.J. Denning, Certification of programs for secure information flow, Comm. of the ACM 20(7) (1977), 504-513.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
17
-
-
0030708182
-
Providing flexibility in information flow control for object-oriented systems
-
E. Ferrari, P. Samarati, E. Bertino and S. Jajodia, Providing flexibility in information flow control for object-oriented systems, in: Proc. lEEE Symp. on Security and Privacy, 1997, pp. 130-140.
-
(1997)
Proc. LEEE Symp. on Security and Privacy
, pp. 130-140
-
-
Ferrari, E.1
Samarati, P.2
Bertino, E.3
Jajodia, S.4
-
18
-
-
35248815514
-
On the secure implementation of security protocols
-
Proc. European Symp. on Programming, Springer
-
P. Giambiagi and M. Dam, On the secure implementation of security protocols, in: Proc. European Symp. on Programming, Volume 2618 of LNCS, Springer, 2003, pp. 144-158.
-
(2003)
LNCS
, vol.2618
, pp. 144-158
-
-
Giambiagi, P.1
Dam, M.2
-
21
-
-
0033751850
-
A semantic approach to secure information flow
-
R. Joshi and K.R.M. Leino, A semantic approach to secure information flow, Science of Computer Programming 37(1-3) (2000), 113-138.
-
(2000)
Science of Computer Programming
, vol.37
, Issue.1-3
, pp. 113-138
-
-
Joshi, R.1
Leino, K.R.M.2
-
22
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
Proc. European Symp. on Programming, Springer
-
P. Laud, Semantics and program analysis of computationally secure information flow, in: Proc. European Symp. on Programming, Volume 2028 of LNCS, Springer, 2001, pp. 77-91.
-
(2001)
LNCS
, vol.2028
, pp. 77-91
-
-
Laud, P.1
-
23
-
-
35248840989
-
Handling encryption in an analysis for secure information flow
-
Proc. European Symp. on Programming, Springer
-
P. Laud, Handling encryption in an analysis for secure information flow, in: Proc. European Symp. on Programming, Volume 2618 of LNCS, Springer, 2003, pp. 159-173.
-
(2003)
LNCS
, vol.2618
, pp. 159-173
-
-
Laud, P.1
-
28
-
-
84881123660
-
Information flow control and applications - Bridging a gap
-
Proc. Formal Methods Europe, Springer
-
H. Mantel, Information flow control and applications - Bridging a gap, in: Proc. Formal Methods Europe, Volume 2021 of LNCS, Springer, 2001, pp. 153-172.
-
(2001)
LNCS
, vol.2021
, pp. 153-172
-
-
Mantel, H.1
-
29
-
-
35048815139
-
Controlled downgrading based on intransitive (non)interference
-
Proceedings of the 2nd Asian Symposium on Programming Languages and Systems, Springer
-
H. Mantel and D. Sands, Controlled downgrading based on intransitive (non)interference, in: Proceedings of the 2nd Asian Symposium on Programming Languages and Systems, Volume 3302 of LNCS, Springer, 2004, pp. 129-145.
-
(2004)
LNCS
, vol.3302
, pp. 129-145
-
-
Mantel, H.1
Sands, D.2
-
33
-
-
0005260169
-
-
July
-
A.C. Myers, L. Zheng, S. Zdancewic, S. Chong and N. Nystrom, Jif: Java information flow, Software release, Located at http://www.cs.cornell.edu/jif, July 2001-2003.
-
(2001)
Jif: Java Information Flow, Software Release
-
-
Myers, A.C.1
Zheng, L.2
Zdancewic, S.3
Chong, S.4
Nystrom, N.5
-
34
-
-
0029228214
-
Absorbing covers and intransitive non-interference
-
S. Pinsky, Absorbing covers and intransitive non-interference, in: Proc. IEEE Symp. on Security and Privacy, 1995, pp. 102-113.
-
(1995)
Proc. IEEE Symp. on Security and Privacy
, pp. 102-113
-
-
Pinsky, S.1
-
38
-
-
0003502331
-
Noninterference, transitivity and channel-control security policies
-
SRI International
-
J.M. Rushb, Noninterference, transitivity and channel-control security policies, Technical Report CSL-92-02, SRI International, 1992.
-
(1992)
Technical Report CSL-92-02
-
-
Rushb, J.M.1
-
40
-
-
35048828759
-
A model for delimited information release
-
Proc. International Symp. on Software Security (ISSS'03), Springer
-
A. Sabelfeld and A.C. Myers, A model for delimited information release, in: Proc. International Symp. on Software Security (ISSS'03), Volume 3233 of LNCS, Springer, 2004, pp. 174-191.
-
(2004)
LNCS
, vol.3233
, pp. 174-191
-
-
Sabelfeld, A.1
Myers, A.C.2
-
42
-
-
0035276729
-
A per model of secure information flow in sequential programs
-
A. Sabelfeld and D. Sands, A per model of secure information flow in sequential programs, Higher Order and Symbolic Computation 14(1) (2001), 59-91.
-
(2001)
Higher Order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
46
-
-
0033330060
-
Probabilistic noninterference in a concurrent language
-
D. Volpano and G. Smith, Probabilistic noninterference in a concurrent language, J. Computer Security 7(2-3) (1999), 231-253.
-
(1999)
J. Computer Security
, vol.7
, Issue.2-3
, pp. 231-253
-
-
Volpano, D.1
Smith, G.2
-
48
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith and C. Irvine, A sound type system for secure flow analysis, J. Computer Security 4(3) (1996), 167-187.
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
52
-
-
84945262623
-
Secure information flow and CPS
-
Proc. European Symp. on Programming, Springer
-
S. Zdancewic and A.C. Myers, Secure information flow and CPS, in: Proc. European Symp. on Programming, Volume 2028 of LNCS, Springer, 2001, pp. 46-61.
-
(2001)
LNCS
, vol.2028
, pp. 46-61
-
-
Zdancewic, S.1
Myers, A.C.2
-
53
-
-
0037974191
-
Secure program partitioning
-
S. Zdancewic, L. Zheng, N. Nystrom and A.C. Myers, Secure program partitioning, ACM Trans. Comput. Syst. 20(3) (2002), 283-328.
-
(2002)
ACM Trans. Comput. Syst.
, vol.20
, Issue.3
, pp. 283-328
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.C.4
-
54
-
-
0038825029
-
Using replication and partitioning to build secure distributed systems
-
L. Zheng, S. Chong, A.C. Myers and S. Zdancewic, Using replication and partitioning to build secure distributed systems, in: Proc. IEEE Symp. on Security and Privacy, 2003, pp. 236-250.
-
(2003)
Proc. IEEE Symp. on Security and Privacy
, pp. 236-250
-
-
Zheng, L.1
Chong, S.2
Myers, A.C.3
Zdancewic, S.4
|