메뉴 건너뛰기




Volumn 3956 LNCS, Issue , 2006, Pages 37-56

Information flow analysis for a typed assembly language with polymorphic stacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; CONSTRAINT THEORY; INFORMATION DISSEMINATION; PROBLEM SOLVING; PROGRAM ASSEMBLERS;

EID: 33745821985     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11741060_3     Document Type: Conference Paper
Times cited : (7)

References (30)
  • 3
    • 84944249026 scopus 로고    scopus 로고
    • Security types preserving compilation
    • Proceedings of VMCAI'04 Springer-Verlag
    • G. Barthe, A. Basu, and T. Rezk. Security types preserving compilation. In Proceedings of VMCAI'04, volume 2937 of Lecture Notes in Computer Science. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2937
    • Barthe, G.1    Basu, A.2    Rezk, T.3
  • 4
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • Technical Report, MITRE, November
    • D. Bell and L. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report Technical Report MTR 2547 v2, MITRE, November 1973.
    • (1973) Technical Report MTR 2547 V2
    • Bell, D.1    LaPadula, L.2
  • 5
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • USAF Electronic Systems Division, Bedford, MA, April
    • K. Biba. Integrity considerations for secure computer systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, April 1977.
    • (1977) Technical Report , vol.ESD-TR-76-372
    • Biba, K.1
  • 9
    • 33646188118 scopus 로고    scopus 로고
    • A monadic analysis of information flow security with mutable state
    • Carnegie Mellon University, September
    • K. Crary, A. Kliger, and F. Pfenning. A monadic analysis of information flow security with mutable state. Technical Report CMU-CS-03-164, Carnegie Mellon University, September 2003.
    • (2003) Technical Report , vol.CMU-CS-03-164
    • Crary, K.1    Kliger, A.2    Pfenning, F.3
  • 10
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-242, May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-242
    • Denning, D.E.1
  • 11
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, July 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 14
    • 28044445125 scopus 로고    scopus 로고
    • Timing aware information flow security for a JavaCard-like bytecode
    • Proceedings of the First Workshop on Bytecode Semantics, Verification, Analysis and Transformation (Bytecode SOUS), December
    • D. Hedin and D. Sands. Timing aware information flow security for a JavaCard-like bytecode. In Proceedings of the First Workshop on Bytecode Semantics, Verification, Analysis and Transformation (Bytecode SOUS), volume 141(1) of Electronic Notes in Theoretical Computer Science, pages 163-182, December 2005.
    • (2005) Electronic Notes in Theoretical Computer Science , vol.141 , Issue.1 , pp. 163-182
    • Hedin, D.1    Sands, D.2
  • 15
    • 33646201525 scopus 로고    scopus 로고
    • A typed assembly language for noninterference
    • M. Coppo, E. Lodi, and G. M. Pinna, editors, Ninth Italian Conference on Theoretical Computer Science - ICTCS 2005 Certosa di Pontignano, Siena (Italy), October. Springer
    • R. Medel, A. Compagnoni, and E. Bonelli. A typed assembly language for noninterference. In M. Coppo, E. Lodi, and G. M. Pinna, editors, Ninth Italian Conference on Theoretical Computer Science - ICTCS 2005, volume 3701 of LNCS, pages 360-374, Certosa di Pontignano, Siena (Italy), October 2005. Springer.
    • (2005) LNCS , vol.3701 , pp. 360-374
    • Medel, R.1    Compagnoni, A.2    Bonelli, E.3
  • 17
    • 0004081831 scopus 로고    scopus 로고
    • Published in Xavier Leroy and Atsushi Ohori, editors. Springer-Verlag
    • Published in Xavier Leroy and Atsushi Ohori, editors, Lecture Notes in Computer Science, volume 1473, pages 28-52. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1473 , pp. 28-52
  • 20
    • 4944241159 scopus 로고    scopus 로고
    • A model for delimited information release
    • International Symposium on Soware Security Tokyo, Japan
    • A. Myers and A. Sabelfeld. A model for delimited information release. In International Symposium on Soware Security, volume 3233 of LNCS, Tokyo, Japan, 2003.
    • (2003) LNCS , vol.3233
    • Myers, A.1    Sabelfeld, A.2
  • 22
    • 0004118855 scopus 로고    scopus 로고
    • PhD thesis, Carnegie Mellon University, September
    • G. Necula. Compiling with Proofs. PhD thesis, Carnegie Mellon University, September 1998.
    • (1998) Compiling with Proofs
    • Necula, G.1
  • 25
    • 84947255140 scopus 로고    scopus 로고
    • Alias types
    • Gert Smolka, editor, Ninth European Symposium on Programming. Springer-Verlag, April
    • F. Smith, D. Walker, and G. Morrisett. Alias types. In Gert Smolka, editor, Ninth European Symposium on Programming, volume 1782 of LNCS, pages 366381. Springer-Verlag, April 2000.
    • (2000) LNCS , vol.1782 , pp. 366381
    • Smith, F.1    Walker, D.2    Morrisett, G.3
  • 26
    • 84956989228 scopus 로고    scopus 로고
    • A type-based approach to program security
    • D. M. Volpano and G. Smith. A type-based approach to program security. In TAPSOFT, pages 607-621, 1997.
    • (1997) TAPSOFT , pp. 607-621
    • Volpano, D.M.1    Smith, G.2
  • 27
    • 0011182354 scopus 로고    scopus 로고
    • A dependently typed assembly language
    • Oregon Graduate Institute of Science and Technology, July
    • H. Xi and R. Harper. A dependently typed assembly language. Technical Report OGI-CSE-99-008, Oregon Graduate Institute of Science and Technology, July 1999.
    • (1999) Technical Report , vol.OGI-CSE-99-008
    • Xi, H.1    Harper, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.