메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 75-84

Refactoring programs to secure information flows

Author keywords

Declassification; Information flow; Refactoring; Slicing

Indexed keywords

DATA PROCESSING; FLOW CONTROL; LAW ENFORCEMENT; SECURITY OF DATA;

EID: 33745938077     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1134744.1134758     Document Type: Conference Paper
Times cited : (23)

References (31)
  • 2
    • 33745849987 scopus 로고    scopus 로고
    • A logic for information flow analysis with an application to forward slicing of simple imperative programs
    • To appear
    • Torben Amtoft and Anindya Banerjee. A logic for information flow analysis with an application to forward slicing of simple imperative programs. Science of Computer Programming. To appear.
    • Science of Computer Programming
    • Amtoft, T.1    Banerjee, A.2
  • 3
    • 33947655397 scopus 로고    scopus 로고
    • Using access control for secure information flow in a java-like language
    • IEEE Computer Society Press, 2003
    • Anindya Banerjee and David Naumann. Using access control for secure information flow in a java-like language. In Proc. IEEE Computer Security Foundations Workshop (CSFW), pages 155-169. IEEE Computer Society Press, 2003., 2003.
    • (2003) Proc. IEEE Computer Security Foundations Workshop (CSFW) , pp. 155-169
    • Banerjee, A.1    Naumann, D.2
  • 4
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and multics interpretation
    • The MITRE Corporation, Bedford, MA
    • David E. Bell and Leonard J. LaPadula. Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997, The MITRE Corporation, Bedford, MA, 1975.
    • (1975) Technical Report , vol.MTR-2997
    • Bell, D.E.1    LaPadula, L.J.2
  • 6
    • 84976732094 scopus 로고
    • Problems with automatic restructurera
    • Frank W. Calliss. Problems with automatic restructurera. SIGPLAN Notices, 23(3): 13-21, 1988.
    • (1988) SIGPLAN Notices , vol.23 , Issue.3 , pp. 13-21
    • Calliss, F.W.1
  • 7
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Dorothy E. Denning. A lattice model of secure information flow. Commun. ACM, 19(5):236-243, 1976.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 10
    • 84885626052 scopus 로고    scopus 로고
    • GrammaTech, Inc. Codesurfer. http://www.grammatech.com/products/ codesurfer/index.html.
    • Codesurfer
  • 23
    • 21644468210 scopus 로고    scopus 로고
    • February
    • Sun Microsystems, Inc, Security code guidelines. http://java.sun.com/ security/seccodeguide.html, February 2000.
    • (2000) Security Code Guidelines
  • 25
    • 0000990322 scopus 로고
    • A survey of program slicing techniques
    • Frank Tip. A survey of program slicing techniques. Journal of programming languages, 3:121-189, 1995.
    • (1995) Journal of Programming Languages , vol.3 , pp. 121-189
    • Tip, F.1
  • 26
    • 0035129729 scopus 로고    scopus 로고
    • Evolving object-oriented designs with refactorings
    • Lance Tokuda and Don Batory. Evolving object-oriented designs with refactorings. Automated Software Eng., 8(1):89-120, 2001.
    • (2001) Automated Software Eng. , vol.8 , Issue.1 , pp. 89-120
    • Tokuda, L.1    Batory, D.2
  • 28
    • 84956989228 scopus 로고    scopus 로고
    • A type-based approach to program security
    • Dennis M. Volpano and Geoffrey Smith. A type-based approach to program security. In TAPSOFT, pages 607-621, 1997.
    • (1997) TAPSOFT , pp. 607-621
    • Volpano, D.M.1    Smith, G.2
  • 29
    • 0021457061 scopus 로고
    • Program slicing
    • July
    • Mark Weiser. Program slicing. IEEE Trans. Softw. Eng., 10(4):352-357, July 1984.
    • (1984) IEEE Trans. Softw. Eng. , vol.10 , Issue.4 , pp. 352-357
    • Weiser, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.