-
2
-
-
33745218861
-
A logic for information flow analysis of pointer programs
-
ACM
-
T. Amtoft, S. Bandhakavi, and A. Banerjee. A logic for information flow analysis of pointer programs. In Proc. POPL'06. ACM, 2006.
-
(2006)
Proc. POPL'06
-
-
Amtoft, T.1
Bandhakavi, S.2
Banerjee, A.3
-
4
-
-
0003400251
-
Secure computer systems: Unified exposition and MULTICS interpretation
-
Mitre Corp., Bedford, Mass., USA, June
-
D.E. Bell and L.J. LaPadula. Secure computer systems: Unified exposition and MULTICS interpretation. Technical Report MTR-2997, Mitre Corp., Bedford, Mass., USA, June 1976.
-
(1976)
Technical Report
, vol.MTR-2997
-
-
Bell, D.E.1
Lapadula, L.J.2
-
5
-
-
0037014243
-
Noninterference for concurrent programs and thread systems
-
G. Boudol and I. Castellani. Noninterference for concurrent programs and thread systems. Theor. Comput. Sci., 281(1-2):109-130, 2002.
-
(2002)
Theor. Comput. Sci.
, vol.281
, Issue.1-2
, pp. 109-130
-
-
Boudol, G.1
Castellani, I.2
-
8
-
-
84974529145
-
Bisimulation equivalence is decidable for basic parallel processes
-
Proc. CONCUR'93, Springer
-
Søren Christensen, Yoram Hirshfeld, and Faron Moller. Bisimulation equivalence is decidable for basic parallel processes. In Proc. CONCUR'93, volume 715 of Lecture Notes in Computer Science, pages 143-157. Springer, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.715
, pp. 143-157
-
-
Christensen, S.1
Hirshfeld, Y.2
Moller, F.3
-
9
-
-
0033718531
-
Confidentiality for mobile code: The case of a simple payment protocol
-
M. Dam and P. Giambiagi. Confidentiality for mobile code: The case of a simple payment protocol. In Proc. Computer Security Foundations Workshop, pages 233-244, 2000.
-
(2000)
Proc. Computer Security Foundations Workshop
, pp. 233-244
-
-
Dam, M.1
Giambiagi, P.2
-
10
-
-
24644445710
-
A theorem proving approach to analysis of secure information flow
-
Proc. Second International Conference on Security in Pervasive Computing, Springer
-
Á. Darvas, R. Hähnle, and D. Sands. A theorem proving approach to analysis of secure information flow. In Proc. Second International Conference on Security in Pervasive Computing, volume 3450 of Lecture Notes in Computer Science, pages 193-209. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3450
, pp. 193-209
-
-
Darvas, Á.1
Hähnle, R.2
Sands, D.3
-
11
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
12
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, July 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
13
-
-
84974776068
-
A classification of security properties for process algebras
-
R. Focardi and R. Gorrieri. A classification of security properties for process algebras. Journal of Computer Security, 3(1):5-33, 1995.
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
15
-
-
24644477761
-
Bridging language-based and process calculi security
-
R. Focardi, S. Rossi, and A. Sabelfeld. Bridging language-based and process calculi security. In Proc. FoSSaCS, pages 299-315, 2005.
-
(2005)
Proc. FoSSaCS
, pp. 299-315
-
-
Focardi, R.1
Rossi, S.2
Sabelfeld, A.3
-
16
-
-
24144440405
-
Information flow analysis for java bytecode
-
Proc. VMCAI'05, Springer
-
Samir Genaim and Fausto Spoto. Information flow analysis for java bytecode. In Proc. VMCAI'05, volume 3385 of Lecture Notes in Computer Science, pages 346-362. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3385
, pp. 346-362
-
-
Genaim, S.1
Spoto, F.2
-
17
-
-
1442286773
-
On the secure implementation of security protocols
-
P. Giambiagi and M. Dam. On the secure implementation of security protocols. Sci.Comput. Program., 50(1-3):73-99, 2004.
-
(2004)
Sci.Comput. Program
, vol.50
, Issue.1-3
, pp. 73-99
-
-
Giambiagi, P.1
Dam, M.2
-
19
-
-
0031701347
-
The SLam Calculus: Programming with secrecy and integrity
-
N. Heintze and J. G. Riecke. The SLam Calculus: Programming with secrecy and integrity. In Proc. POPL'98, pages 365-377, 1998.
-
(1998)
Proc. POPL'98
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.G.2
-
20
-
-
28144461940
-
Downgrading policies and relaxed noninterference
-
P. Li and S. Zdancewic. Downgrading policies and relaxed noninterference. In Proc. POPL'05, pages 158-170, 2005.
-
(2005)
Proc. POPL'05
, pp. 158-170
-
-
Li, P.1
Zdancewic, S.2
-
21
-
-
0033701251
-
Possibilistic definitions of security - An assembly kit
-
H. Mantel. Possibilistic definitions of security - an assembly kit -. In Proc. Computer Security Foundations Workshop, pages 185-199, 2000.
-
(2000)
Proc. Computer Security Foundations Workshop
, pp. 185-199
-
-
Mantel, H.1
-
22
-
-
84881123660
-
Information flow control and applications - Bridging a gap
-
H. Mantel. Information flow control and applications - bridging a gap. In Proc. FME, pages 153-172, 2001.
-
(2001)
Proc. FME
, pp. 153-172
-
-
Mantel, H.1
-
23
-
-
35048815139
-
Controlled declassification based on intransitive noninterference
-
H. Mantel and D. Sands. Controlled declassification based on intransitive noninterference. In Proc. APLAS, pages 129-145, 2004.
-
(2004)
Proc. APLAS
, pp. 129-145
-
-
Mantel, H.1
Sands, D.2
-
24
-
-
33646201525
-
A typed assembly language for non-interference
-
Proc. Italian Conference on Theoretical Computer Science, Springer
-
Ricardo Medel, Adriana B. Compagnoni, and Eduardo Bonelli. A typed assembly language for non-interference. In Proc. Italian Conference on Theoretical Computer Science, volume 3701 of Lecture Notes in Computer Science, pages 360-374. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3701
, pp. 360-374
-
-
Medel, R.1
Compagnoni, A.B.2
Bonelli, E.3
-
26
-
-
0003502331
-
Noninterference, transitivity, and channel-control security policies
-
Stanford Research Institute
-
J. Rushby. Noninterference, transitivity, and channel-control security policies. Technical Report CSL-92-2, Stanford Research Institute, 1992.
-
(1992)
Technical Report
, vol.CSL-92-2
-
-
Rushby, J.1
-
27
-
-
33745197683
-
Confidentiality for multithreaded programs via bisimulation
-
Proc. A. Ershov 5th International Conference on Perspectives of System Informatics, Springer
-
A. Sabelfeld. Confidentiality for multithreaded programs via bisimulation. In Proc. A. Ershov 5th International Conference on Perspectives of System Informatics, volume 2890 of Lecture Notes in Computer Science, pages 260-274. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2890
, pp. 260-274
-
-
Sabelfeld, A.1
-
29
-
-
35048828759
-
A model for delimited information release
-
Proc. International Symposium on Software Security, Springer
-
A. Sabelfeld and A. C. Myers. A model for delimited information release. In Proc. International Symposium on Software Security, volume 3233 of Lecture Notes in Computer Science, pages 174-191. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.3233
, pp. 174-191
-
-
Sabelfeld, A.1
Myers, A.C.2
-
31
-
-
0035276729
-
A PER model of secure information flow in sequential programs
-
A. Sabelfeld and D. Sands. A PER model of secure information flow in sequential programs. Higher-Order and Symbolic Computation, 14(1):59-91, 2001.
-
(2001)
Higher-order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
33
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
G. Smith and D. Volpano. Secure information flow in a multi-threaded imperative language. In Proc. POPL'98, pages 355-364, 1998.
-
(1998)
Proc. POPL'98
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
34
-
-
33646037706
-
Secure information flow as a safety problem
-
Proc. SAS'05, Springer
-
Tachio Terauchi and Alexander Aiken. Secure information flow as a safety problem. In Proc. SAS'05, volume 3672 of Lecture Notes in Computer Science, pages 352-367. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3672
, pp. 352-367
-
-
Terauchi, T.1
Aiken, A.2
-
36
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|