메뉴 건너뛰기




Volumn 41, Issue 1, 2006, Pages 91-102

A logic for information flow in object-oriented programs

Author keywords

Aliasing; Confidentiality; Information flow

Indexed keywords

ALGORITHMS; COMPUTER HARDWARE DESCRIPTION LANGUAGES; COMPUTER PROGRAMMING; INFORMATION ANALYSIS; OBJECT ORIENTED PROGRAMMING;

EID: 33745193737     PISSN: 03621340     EISSN: 03621340     Source Type: Journal    
DOI: 10.1145/1111320.1111046     Document Type: Article
Times cited : (24)

References (26)
  • 1
    • 33745219100 scopus 로고    scopus 로고
    • A logic for information flow analysis of pointer programs
    • Kansas State University, July
    • T. Amtoft, S. Bandhakavi, and A. Banerjee. A logic for information flow analysis of pointer programs. Technical Report CIS TR 2005-1, Kansas State University, July 2005.
    • (2005) Technical Report , vol.CIS TR 2005-1
    • Amtoft, T.1    Bandhakavi, S.2    Banerjee, A.3
  • 2
    • 35048839749 scopus 로고    scopus 로고
    • Information flow analysis in logical form
    • SAS, Springer-Verlag
    • T. Amtoft and A. Banerjee. Information flow analysis in logical form. In SAS, LNCS 3148, pages 100-115. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3148 , pp. 100-115
    • Amtoft, T.1    Banerjee, A.2
  • 3
    • 33745215021 scopus 로고    scopus 로고
    • A logic for information flow analysis with an application to forward slicing of simple imperative programs
    • Science of Computer Programming. To appear
    • T. Amtoft and A. Banerjee. A logic for information flow analysis with an application to forward slicing of simple imperative programs. Science of Computer Programming, special issue of SAS 2004. To appear.
    • SAS 2004 , Issue.SPEC. ISSUE
    • Amtoft, T.1    Banerjee, A.2
  • 5
    • 33646080360 scopus 로고    scopus 로고
    • Security-typed languages for implementation of cryptographic protocols: A case study
    • ESORICS. Springer-Verlag
    • A. Askarov and A. Sabelfeld. Security-typed languages for implementation of cryptographic protocols: A case study. In ESORICS, LNCS 3679, pages 197-221. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3679 , pp. 197-221
    • Askarov, A.1    Sabelfeld, A.2
  • 6
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based access control and secure information flow
    • Mar.
    • A. Banerjee and D. A. Naumann. Stack-based access control and secure information flow. JFP 15(2): 131-177, Mar. 2005.
    • (2005) JFP , vol.15 , Issue.2 , pp. 131-177
    • Banerjee, A.1    Naumann, D.A.2
  • 8
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • MITRE Corp.
    • D. Bell and L. LaPadula. Secure computer systems: Mathematical foundations. Technical Report MTR-2547, MITRE Corp., 1973.
    • (1973) Technical Report , vol.MTR-2547
    • Bell, D.1    LaPadula, L.2
  • 13
    • 33745213914 scopus 로고
    • Analysis of pointers and structures (with retrospective)
    • D. R. Chase, M. N. Wegman, and F. K. Zadeck. Analysis of pointers and structures (with retrospective). In Best of PLDI, pages 343-359, 1990.
    • (1990) Best of PLDI , pp. 343-359
    • Chase, D.R.1    Wegman, M.N.2    Zadeck, F.K.3
  • 14
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • Academic Press
    • E. S. Cohen. Information transmission in sequential programs. In Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 15
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. Denning and P. Denning. Certification of programs for secure information flow. CACM 20(7):504-513, 1977.
    • (1977) CACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.1    Denning, P.2
  • 18
    • 33745847182 scopus 로고    scopus 로고
    • On flow-sensitive security types
    • To appear
    • S. Hunt and D. Sands. On flow-sensitive security types. In POPL 2006. To appear.
    • POPL 2006
    • Hunt, S.1    Sands, D.2
  • 19
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • A. C. Myers. JFlow: Practical mostly-static information flow control. In POPL, pages 228-241, 1999.
    • (1999) POPL , pp. 228-241
    • Myers, A.C.1
  • 21
    • 84944269268 scopus 로고    scopus 로고
    • Local reasoning about programs that alter data structures
    • CSL. Springer-Verlag
    • P. O'Hearn, J. Reynolds, and H. Yang. Local reasoning about programs that alter data structures. In CSL, LNCS 2142, pages 1-19. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2142 , pp. 1-19
    • O'Hearn, P.1    Reynolds, J.2    Yang, H.3
  • 22
    • 0348017041 scopus 로고    scopus 로고
    • Information flow inference for ML
    • Jan.
    • F. Pottier and V. Simonet. Information flow inference for ML. TOPLAS 25(1):117-158, Jan. 2003.
    • (2003) TOPLAS , vol.25 , Issue.1 , pp. 117-158
    • Pottier, F.1    Simonet, V.2
  • 23
    • 0036051192 scopus 로고    scopus 로고
    • Separation logic: A logic for shared mutable data structures
    • J. C. Reynolds. Separation logic: a logic for shared mutable data structures. In LICS, pages 55-74. 2002.
    • (2002) LICS , pp. 55-74
    • Reynolds, J.C.1
  • 25
    • 35048864843 scopus 로고    scopus 로고
    • Modular and constraint-based information flow inference for an object-oriented language
    • SAS. Springer-Verlag
    • Q. Sun, A. Banerjee, and D. A. Naumann. Modular and constraint-based information flow inference for an object-oriented language. In SAS, LNCS 3148, pages 84-99. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3148 , pp. 84-99
    • Sun, Q.1    Banerjee, A.2    Naumann, D.A.3
  • 26
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(2/3): 167-188, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.2-3 , pp. 167-188
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.