메뉴 건너뛰기




Volumn 3924 LNCS, Issue , 2006, Pages 162-179

A typed assembly language for confidentiality

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; CODES (SYMBOLS); COMPUTATION THEORY; COMPUTER PROGRAMMING; DATA REDUCTION; DISTRIBUTED COMPUTER SYSTEMS; ELECTRONIC EQUIPMENT MANUFACTURE; INFORMATION ANALYSIS; PROBLEM SOLVING; COMPUTATIONAL LINGUISTICS; JAVA PROGRAMMING LANGUAGE;

EID: 33745771350     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11693024_12     Document Type: Conference Paper
Times cited : (9)

References (24)
  • 4
    • 0027565268 scopus 로고
    • What's in a region? Or computing control dependence regions in near-linear time for reducible control flow
    • Mar-Dec.
    • T. Ball. What's in a region? Or computing control dependence regions in near-linear time for reducible control flow. ACM Letters on Prog. Long. and Syst., 2(1-4):1-16, Mar-Dec. 1993.
    • (1993) ACM Letters on Prog. Long. and Syst. , vol.2 , Issue.1-4 , pp. 1-16
    • Ball, T.1
  • 5
    • 84948752619 scopus 로고    scopus 로고
    • Secure information flow and pointer confinement in a Java-like language
    • June
    • A. Banerjee and D. A. Naumann. Secure information flow and pointer confinement in a Java-like language. In Proc. 15th IEEE CSFW Workshop, pages 253-267, June 2002.
    • (2002) Proc. 15th IEEE CSFW Workshop , pp. 253-267
    • Banerjee, A.1    Naumann, D.A.2
  • 6
    • 84944249026 scopus 로고    scopus 로고
    • Security types preserving compilation
    • Proc. 5th International Conf. on VMCAI, Venice, Italy, Jan.
    • G. Barthe, A. Basu, and T. Rezk. Security types preserving compilation. In Proc. 5th International Conf. on VMCAI, volume 2937 of LNCS, pages 2-15, Venice, Italy, Jan. 2004.
    • (2004) LNCS , vol.2937 , pp. 2-15
    • Barthe, G.1    Basu, A.2    Rezk, T.3
  • 7
    • 24144453483 scopus 로고    scopus 로고
    • SIFTAL: A typed assembly language for secure information flow analysis
    • Stevens Inst, of Tech., Hoboken, NJ, July
    • E. Bonelli, A. Compagnoni, and R. Medel. SIFTAL: A typed assembly language for secure information flow analysis. Technical report, Stevens Inst, of Tech., Hoboken, NJ, July 2004.
    • (2004) Technical Report
    • Bonelli, E.1    Compagnoni, A.2    Medel, R.3
  • 8
    • 0031701347 scopus 로고    scopus 로고
    • The SLam calculus: Programming with security and integrity
    • San Diego, CA, Jan.
    • N. Heintze and J. G. Riecke. The SLam calculus: Programming with security and integrity. In Proc. 25th ACM Symp. on Prin. of Prog. Lang., pages 365-377, San Diego, CA, Jan. 1998.
    • (1998) Proc. 25th ACM Symp. on Prin. of Prog. Lang. , pp. 365-377
    • Heintze, N.1    Riecke, J.G.2
  • 12
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • San Antonio, TX
    • A. C. Myers. JFlow: Practical mostly-static information flow control. In Proc. 26th ACM Symp. on Prin. of Prog. Lang., pages 228-241, San Antonio, TX, 1999.
    • (1999) Proc. 26th ACM Symp. on Prin. of Prog. Lang. , pp. 228-241
    • Myers, A.C.1
  • 15
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sept.
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proc. of the IEEE, 63(9), Sept. 1975.
    • (1975) Proc. of the IEEE , vol.63 , Issue.9
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 16
    • 0012889295 scopus 로고    scopus 로고
    • A language-based approach to security
    • Informatics: 10 Years Back, 10 Years Ahead
    • F. B. Schneider, G. Morrisett, and R. Harper. A language-based approach to security. In Informatics: 10 Years Back, 10 Years Ahead, volume 2000 of LNCS, pages 86-101, 2001.
    • (2001) LNCS , vol.2000 , pp. 86-101
    • Schneider, F.B.1    Morrisett, G.2    Harper, R.3
  • 17
    • 84947255140 scopus 로고    scopus 로고
    • Alias types
    • Proc. 9th European Symposium on Programming, Berlin, Germany, Apr.
    • F. Smith, D. Walker, and G. Morrisett. Alias types. In Proc. 9th European Symposium on Programming, volume 1782 of LNCS, pages 366-381, Berlin, Germany, Apr. 2000.
    • (2000) LNCS , vol.1782 , pp. 366-381
    • Smith, F.1    Walker, D.2    Morrisett, G.3
  • 18
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • San Diego, CA, Jan.
    • G. Smith and D. Volpano. Secure information flow in a multi-threaded imperative language. In Proc. 25th ACM Symp. on Prin. of Prog. Lang., pages 355-364, San Diego, CA, Jan. 1998.
    • (1998) Proc. 25th ACM Symp. on Prin. of Prog. Lang. , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 20
    • 84956989228 scopus 로고    scopus 로고
    • A type-based approach to program security
    • LNCS, Lille, France, Apr.
    • D. Volpano and G. Smith. A type-based approach to program security. In Proc. 7th Inter. Joint Conf. CAAP/FASE TAPSOFT, LNCS, pages 607-621, Lille, France, Apr. 1997.
    • (1997) Proc. 7th Inter. Joint Conf. CAAP/FASE TAPSOFT , pp. 607-621
    • Volpano, D.1    Smith, G.2
  • 21
    • 0031633213 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language
    • Washington, DC, June
    • D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. In Proc. 11th IEEE CSFW Workshop, pages 34-43, Washington, DC, June 1998.
    • (1998) Proc. 11th IEEE CSFW Workshop , pp. 34-43
    • Volpano, D.1    Smith, G.2
  • 23
    • 33745769548 scopus 로고    scopus 로고
    • A typed assembly language for confidentiality
    • DoCoMo Communications Laboratories USA, San Jose, CA, Mar.
    • D. Yu and N. Islam. A typed assembly language for confidentiality. Technical Report DCL-TR-2005-0002, DoCoMo Communications Laboratories USA, San Jose, CA, Mar. 2005. http://www.docomolabsresearchers-usa.com/~dyu/talc-tr.pdf.
    • (2005) Technical Report , vol.DCL-TR-2005-0002
    • Yu, D.1    Islam, N.2
  • 24
    • 0036761582 scopus 로고    scopus 로고
    • Secure information flow via linear continuations
    • Sept.
    • S. Zdancewic and A. C. Myers. Secure information flow via linear continuations. Higher-Order and Symbolic Computation, 15(2-3):209-234, Sept. 2002.
    • (2002) Higher-order and Symbolic Computation , vol.15 , Issue.2-3 , pp. 209-234
    • Zdancewic, S.1    Myers, A.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.