-
1
-
-
0032681509
-
A core calculus of dependency
-
San Antonio, TX, Jan.
-
M. Abadi, A. Banerjee, H. Heintze, and J. G. Riecke. A core calculus of dependency. In Proc. 26th ACM Symp. on Prin. of Prog. Lang., pages 147-160, San Antonio, TX, Jan. 1999.
-
(1999)
Proc. 26th ACM Symp. on Prin. of Prog. Lang.
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, H.3
Riecke, J.G.4
-
4
-
-
0027565268
-
What's in a region? Or computing control dependence regions in near-linear time for reducible control flow
-
Mar-Dec.
-
T. Ball. What's in a region? Or computing control dependence regions in near-linear time for reducible control flow. ACM Letters on Prog. Long. and Syst., 2(1-4):1-16, Mar-Dec. 1993.
-
(1993)
ACM Letters on Prog. Long. and Syst.
, vol.2
, Issue.1-4
, pp. 1-16
-
-
Ball, T.1
-
5
-
-
84948752619
-
Secure information flow and pointer confinement in a Java-like language
-
June
-
A. Banerjee and D. A. Naumann. Secure information flow and pointer confinement in a Java-like language. In Proc. 15th IEEE CSFW Workshop, pages 253-267, June 2002.
-
(2002)
Proc. 15th IEEE CSFW Workshop
, pp. 253-267
-
-
Banerjee, A.1
Naumann, D.A.2
-
6
-
-
84944249026
-
Security types preserving compilation
-
Proc. 5th International Conf. on VMCAI, Venice, Italy, Jan.
-
G. Barthe, A. Basu, and T. Rezk. Security types preserving compilation. In Proc. 5th International Conf. on VMCAI, volume 2937 of LNCS, pages 2-15, Venice, Italy, Jan. 2004.
-
(2004)
LNCS
, vol.2937
, pp. 2-15
-
-
Barthe, G.1
Basu, A.2
Rezk, T.3
-
7
-
-
24144453483
-
SIFTAL: A typed assembly language for secure information flow analysis
-
Stevens Inst, of Tech., Hoboken, NJ, July
-
E. Bonelli, A. Compagnoni, and R. Medel. SIFTAL: A typed assembly language for secure information flow analysis. Technical report, Stevens Inst, of Tech., Hoboken, NJ, July 2004.
-
(2004)
Technical Report
-
-
Bonelli, E.1
Compagnoni, A.2
Medel, R.3
-
8
-
-
0031701347
-
The SLam calculus: Programming with security and integrity
-
San Diego, CA, Jan.
-
N. Heintze and J. G. Riecke. The SLam calculus: Programming with security and integrity. In Proc. 25th ACM Symp. on Prin. of Prog. Lang., pages 365-377, San Diego, CA, Jan. 1998.
-
(1998)
Proc. 25th ACM Symp. on Prin. of Prog. Lang.
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.G.2
-
9
-
-
33745798437
-
Non-interference for a typed assembly language
-
Chicago, IL, June
-
R. Medel, A. Compagnoni, and E. Bonelli. Non-interference for a typed assembly language. In Proc. 2005 Workshop on Foundations of Computer Security, Chicago, IL, June 2005.
-
(2005)
Proc. 2005 Workshop on Foundations of Computer Security
-
-
Medel, R.1
Compagnoni, A.2
Bonelli, E.3
-
10
-
-
0036010442
-
Stack-based typed assembly language
-
Jan.
-
G. Morrisett, K. Crary, N. Glew, and D. Walker. Stack-based typed assembly language. Journal of Functional Programming, 12(1):43-88, Jan. 2002.
-
(2002)
Journal of Functional Programming
, vol.12
, Issue.1
, pp. 43-88
-
-
Morrisett, G.1
Crary, K.2
Glew, N.3
Walker, D.4
-
11
-
-
0041525084
-
From system F to typed assembly language
-
Nov.
-
G. Morrisett, D. Walker, K. Crary, and N. Glew. From system F to typed assembly language. ACM Transactions on Programming Languages and Systems, 21(3):527-568, Nov. 1999.
-
(1999)
ACM Transactions on Programming Languages and Systems
, vol.21
, Issue.3
, pp. 527-568
-
-
Morrisett, G.1
Walker, D.2
Crary, K.3
Glew, N.4
-
12
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
San Antonio, TX
-
A. C. Myers. JFlow: Practical mostly-static information flow control. In Proc. 26th ACM Symp. on Prin. of Prog. Lang., pages 228-241, San Antonio, TX, 1999.
-
(1999)
Proc. 26th ACM Symp. on Prin. of Prog. Lang.
, pp. 228-241
-
-
Myers, A.C.1
-
15
-
-
0016555241
-
The protection of information in computer systems
-
Sept.
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proc. of the IEEE, 63(9), Sept. 1975.
-
(1975)
Proc. of the IEEE
, vol.63
, Issue.9
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
16
-
-
0012889295
-
A language-based approach to security
-
Informatics: 10 Years Back, 10 Years Ahead
-
F. B. Schneider, G. Morrisett, and R. Harper. A language-based approach to security. In Informatics: 10 Years Back, 10 Years Ahead, volume 2000 of LNCS, pages 86-101, 2001.
-
(2001)
LNCS
, vol.2000
, pp. 86-101
-
-
Schneider, F.B.1
Morrisett, G.2
Harper, R.3
-
17
-
-
84947255140
-
Alias types
-
Proc. 9th European Symposium on Programming, Berlin, Germany, Apr.
-
F. Smith, D. Walker, and G. Morrisett. Alias types. In Proc. 9th European Symposium on Programming, volume 1782 of LNCS, pages 366-381, Berlin, Germany, Apr. 2000.
-
(2000)
LNCS
, vol.1782
, pp. 366-381
-
-
Smith, F.1
Walker, D.2
Morrisett, G.3
-
18
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
San Diego, CA, Jan.
-
G. Smith and D. Volpano. Secure information flow in a multi-threaded imperative language. In Proc. 25th ACM Symp. on Prin. of Prog. Lang., pages 355-364, San Diego, CA, Jan. 1998.
-
(1998)
Proc. 25th ACM Symp. on Prin. of Prog. Lang.
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
20
-
-
84956989228
-
A type-based approach to program security
-
LNCS, Lille, France, Apr.
-
D. Volpano and G. Smith. A type-based approach to program security. In Proc. 7th Inter. Joint Conf. CAAP/FASE TAPSOFT, LNCS, pages 607-621, Lille, France, Apr. 1997.
-
(1997)
Proc. 7th Inter. Joint Conf. CAAP/FASE TAPSOFT
, pp. 607-621
-
-
Volpano, D.1
Smith, G.2
-
21
-
-
0031633213
-
Probabilistic noninterference in a concurrent language
-
Washington, DC, June
-
D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. In Proc. 11th IEEE CSFW Workshop, pages 34-43, Washington, DC, June 1998.
-
(1998)
Proc. 11th IEEE CSFW Workshop
, pp. 34-43
-
-
Volpano, D.1
Smith, G.2
-
23
-
-
33745769548
-
A typed assembly language for confidentiality
-
DoCoMo Communications Laboratories USA, San Jose, CA, Mar.
-
D. Yu and N. Islam. A typed assembly language for confidentiality. Technical Report DCL-TR-2005-0002, DoCoMo Communications Laboratories USA, San Jose, CA, Mar. 2005. http://www.docomolabsresearchers-usa.com/~dyu/talc-tr.pdf.
-
(2005)
Technical Report
, vol.DCL-TR-2005-0002
-
-
Yu, D.1
Islam, N.2
-
24
-
-
0036761582
-
Secure information flow via linear continuations
-
Sept.
-
S. Zdancewic and A. C. Myers. Secure information flow via linear continuations. Higher-Order and Symbolic Computation, 15(2-3):209-234, Sept. 2002.
-
(2002)
Higher-order and Symbolic Computation
, vol.15
, Issue.2-3
, pp. 209-234
-
-
Zdancewic, S.1
Myers, A.C.2
|