메뉴 건너뛰기




Volumn , Issue , 2006, Pages 79-90

On flow-sensitive security types

Author keywords

Flow sensitivity; Information flow; Non interference; Static analysis; Type systems

Indexed keywords

COMPUTER PROGRAMMING; INDEXING (OF INFORMATION); INFORMATION ANALYSIS; SEMANTICS; STATISTICAL METHODS;

EID: 33745847182     PISSN: 07308566     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1111037.1111045     Document Type: Conference Paper
Times cited : (100)

References (22)
  • 1
    • 35048839749 scopus 로고    scopus 로고
    • Information flow analysis in logical form
    • [AB04]. SAS 2004 (11th Static Analysis Symposium), Verona, Italy, August 2004, Springer-Verlag
    • [AB04] Torben Amtoft and Anindya Banerjee. Information flow analysis in logical form. In SAS 2004 (11th Static Analysis Symposium), Verona, Italy, August 2004, volume 3148 of LNCS, pages 100-115. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3148 , pp. 100-115
    • Amtoft, T.1    Banerjee, A.2
  • 4
    • 84976840591 scopus 로고
    • An axiomatic approach to information flow in programs
    • [AR80]. January
    • [AR80] G. R. Andrews and R. P. Reitman. An axiomatic approach to information flow in programs. ACM TOPLAS, 2(1):56-75, January 1980.
    • (1980) ACM TOPLAS , vol.2 , Issue.1 , pp. 56-75
    • Andrews, G.R.1    Reitman, R.P.2
  • 5
    • 0002397990 scopus 로고
    • Compile-time detection of information flow in sequential programs
    • [BBL94]. Proc. European Symp. on Research in Computer Security, Springer-Verlag
    • [BBL94] J.-P. Banâtre, C. Bryce, and D. Le Métayer. Compile-time detection of information flow in sequential programs. In Proc. European Symp. on Research in Computer Security, volume 875 of LNCS, pages 55-73. Springer-Verlag, 1994.
    • (1994) LNCS , vol.875 , pp. 55-73
    • Banâtre, J.-P.1    Bryce, C.2    Le Métayer, D.3
  • 6
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • [CC77]. January
    • [CC77] P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proc. ACM Symp. on Principles of Programming Languages, pages 238-252, January 1977.
    • (1977) Proc. ACM Symp. on Principles of Programming Languages , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 10
    • 0036555709 scopus 로고    scopus 로고
    • Information flow for Algol-like languages
    • [CHH02]. April
    • [CHH02] D. Clark, C. Hankin, and S. Hunt. Information flow for Algol-like languages. Journal of Computer Languages, 28(1):3-28, April 2002.
    • (2002) Journal of Computer Languages , vol.28 , Issue.1 , pp. 3-28
    • Clark, D.1    Hankin, C.2    Hunt, S.3
  • 11
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • [DD77]. July
    • [DD77] D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 13
    • 0000651947 scopus 로고    scopus 로고
    • Making abstract interpretations complete
    • [GRS00]
    • [GRS00] Roberto Giacobazzi, Francesco Ranzato, and Francesca Scozzari. Making abstract interpretations complete. J. ACM, 47(2):361-416, 2000.
    • (2000) J. ACM , vol.47 , Issue.2 , pp. 361-416
    • Giacobazzi, R.1    Ranzato, F.2    Scozzari, F.3
  • 14
    • 24144440405 scopus 로고    scopus 로고
    • Information flow analysis for java bytecode
    • [GS05]. R. Cousot, editor, Proc. of the Sixth International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), Paris, France, January . Springer-Verlag
    • [GS05] S. Genaim and F. Spoto. Information Flow Analysis for Java Bytecode. In R. Cousot, editor, Proc. of the Sixth International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), volume 3385 of Lecture Notes in Computer Science, pages 346-362, Paris, France, January 2005. Springer-Verlag.
    • (2005) Lecture Notes in Computer Science , vol.3385 , pp. 346-362
    • Genaim, S.1    Spoto, F.2
  • 20
    • 0035276729 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • [SS01]. March . Earlier version in ESOP'99
    • [SS01] A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher Order and Symbolic Computation, 14(1):59-91, March 2001. Earlier version in ESOP'99.
    • (2001) Higher Order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 21
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • [VSI96]
    • [VSI96] D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3):167-187, 1996.
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 22
    • 84869183079 scopus 로고    scopus 로고
    • The essence of principal typings
    • [Wel02]. Proc. International Colloquium on Automata, Languages and Programming, Springer-Verlag
    • [Wel02] J. B. Wells. The essence of principal typings. In Proc. International Colloquium on Automata, Languages and Programming, volume 2380 of LNCS, pages 913-925. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2380 , pp. 913-925
    • Wells, J.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.