-
3
-
-
33745220946
-
Ownership confinement ensures representation independence for object-oriented programs
-
Nov.
-
A. Banerjee and D. A. Naumann. Ownership confinement ensures representation independence for object-oriented programs. Journal of the ACM, 52(6):894-960, Nov. 2005.
-
(2005)
Journal of the ACM
, vol.52
, Issue.6
, pp. 894-960
-
-
Banerjee, A.1
Naumann, D.A.2
-
4
-
-
17044429386
-
Stack-based access control for secure information flow
-
A. Banerjee and D. A. Naumann. Stack-based access control for secure information flow. Journal of Functional Programming, 15(2): 131-177, 2005.
-
(2005)
Journal of Functional Programming
, vol.15
, Issue.2
, pp. 131-177
-
-
Banerjee, A.1
Naumann, D.A.2
-
6
-
-
19044390891
-
The Spec# programming system: An overview
-
G. Barthe, L. Burdy, M. Huisman, J.-L. Lanet, and T. Muntean, editors, Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop (CASSIS 2004), Revised Selected Papers, Springer
-
M. Barnett, K. R. M. Leino, and W. Schulte. The Spec# programming system: An overview. In G. Barthe, L. Burdy, M. Huisman, J.-L. Lanet, and T. Muntean, editors, Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop (CASSIS 2004), Revised Selected Papers, volume 3362 of LNCS, pages 49-69. Springer, 2005.
-
(2005)
LNCS
, vol.3362
, pp. 49-69
-
-
Barnett, M.1
Leino, K.R.M.2
Schulte, W.3
-
8
-
-
29144532201
-
Non-interference for a JVM-like language
-
M. Fähndrich, editor, ACM Press
-
G. Barthe and T. Rezk. Non-interference for a JVM-like language. In M. Fähndrich, editor, Proceedings of TLDI'05, pages 103-112. ACM Press, 2005.
-
(2005)
Proceedings of TLDI'05
, pp. 103-112
-
-
Barthe, G.1
Rezk, T.2
-
9
-
-
1442263162
-
Simple relational correctness proofs for static analyses and program transformations
-
N. Benton. Simple relational correctness proofs for static analyses and program transformations. In ACM Symposium on Principles of Programming Languages (POPL), pages 14-25, 2004.
-
(2004)
ACM Symposium on Principles of Programming Languages (POPL)
, pp. 14-25
-
-
Benton, N.1
-
10
-
-
0001760770
-
Information transmission in sequential programs
-
A. K. J. Richard A. DeMillo, David P. Dobkin and R. J. Lipton, editors, Academic Press
-
E. S. Cohen. Information transmission in sequential programs. In A. K. J. Richard A. DeMillo, David P. Dobkin and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
11
-
-
24644445710
-
A theorem proving approach to analysis of secure information flow
-
D. Hutter and M. Ullmann, editors, Proc. 2nd International Conference on Security in Pervasive Computing, Springer
-
A. Darvas, R. Hähnle, and D. Sands. A theorem proving approach to analysis of secure information flow. In D. Hutter and M. Ullmann, editors, Proc. 2nd International Conference on Security in Pervasive Computing, volume 3450 of LNCS, pages 193-209. Springer, 2005.
-
(2005)
LNCS
, vol.3450
, pp. 193-209
-
-
Darvas, A.1
Hähnle, R.2
Sands, D.3
-
16
-
-
33750243650
-
Data refinement and the tranform
-
M. Broy, editor, Springer, International Summer School at Marktoberdorf
-
D. Gries. Data refinement and the tranform. In M. Broy, editor, Program Design Calculi. Springer, 1993. International Summer School at Marktoberdorf.
-
(1993)
Program Design Calculi
-
-
Gries, D.1
-
17
-
-
0036041563
-
Lazy abstraction
-
T. A. Henzinger, R. Jhala, R. Majumdar, and G. Sutre. Lazy abstraction. In ACM Symposium on Principles of Programming Languages (POPL), pages 58-70, 2002.
-
(2002)
ACM Symposium on Principles of Programming Languages (POPL)
, pp. 58-70
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
18
-
-
35048865734
-
Java program verification at Nijmegen: Developments and perspective
-
Technical Report NIII-R0318, Computing Science Institute, University of Nijmegen, 2003. In International Symposium on Software Security, Springer
-
B. Jacobs and E. Poll. Java program verification at Nijmegen: Developments and perspective. Technical Report NIII-R0318, Computing Science Institute, University of Nijmegen, 2003. In International Symposium on Software Security, volume 3233, of LNCS, pages 134-153. Springer, 2003.
-
(2003)
LNCS
, vol.3233
, pp. 134-153
-
-
Jacobs, B.1
Poll, E.2
-
19
-
-
0142245536
-
How the design of JML accommodates both runtime assertion checking and formal verification
-
F. S. de Boer, M. M. Bonsangue, S. Graf, and W.-P. de Roever, editors, Formal Methods for Components and Objects (FMCO 2002), Springer
-
G. T. Leavens, Y. Cheon, C. Clifton, C. Ruby, and D. R. Cok. How the design of JML accommodates both runtime assertion checking and formal verification. In F. S. de Boer, M. M. Bonsangue, S. Graf, and W.-P. de Roever, editors, Formal Methods for Components and Objects (FMCO 2002), volume 2852 of LNCS, pages 262-284. Springer, 2003.
-
(2003)
LNCS
, vol.2852
, pp. 262-284
-
-
Leavens, G.T.1
Cheon, Y.2
Clifton, C.3
Ruby, C.4
Cok, D.R.5
-
20
-
-
27744588162
-
Modular invariants for layered object structures
-
Department of Computer Science, ETH Zurich
-
P. Müller, A. Poetzsch-Heffter, and G. T. Leavens. Modular invariants for layered object structures. Technical Report 424, Department of Computer Science, ETH Zurich, 2004.
-
(2004)
Technical Report
, vol.424
-
-
Müller, P.1
Poetzsch-Heffter, A.2
Leavens, G.T.3
-
22
-
-
26844529721
-
Verifying a secure information flow analyzer
-
J. Hurd and T. Melham, editors, 18th International Conference on Theorem Proving in Higher Order Logics TPHOLS, Springer
-
D. A. Naumann. Verifying a secure information flow analyzer. In J. Hurd and T. Melham, editors, 18th International Conference on Theorem Proving in Higher Order Logics TPHOLS, volume 3603 of LNCS pages 211-226. Springer, 2005.
-
(2005)
LNCS
, vol.3603
, pp. 211-226
-
-
Naumann, D.A.1
-
23
-
-
33750236160
-
Towards imperative modules: Reasoning about invariants and sharing of mutable state
-
To appear in
-
D. A. Naumann and M. Barnett. Towards imperative modules: Reasoning about invariants and sharing of mutable state. To appear in Theoretical Computer Science, 2006.
-
(2006)
Theoretical Computer Science
-
-
Naumann, D.A.1
Barnett, M.2
-
26
-
-
0036051192
-
Separation logic: A logic for shared mutable data structures
-
J. C. Reynolds. Separation logic: a logic for shared mutable data structures. In IEEE Logic in Computer Science (LICS), pages 55-74, 2002.
-
(2002)
IEEE Logic in Computer Science (LICS)
, pp. 55-74
-
-
Reynolds, J.C.1
-
28
-
-
0035276729
-
A per model of secure information flow in sequential programs
-
A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher-order and Symbolic Computation, 14(1):59-91, 2001.
-
(2001)
Higher-order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
30
-
-
33646037706
-
Secure information flow as a safety problem
-
12th International Static Analysis Symposium (SAS), Springer
-
T. Terauchi and A. Aiken. Secure information flow as a safety problem. In 12th International Static Analysis Symposium (SAS), volume 3672 of LNCS, pages 352-367. Springer, 2005.
-
(2005)
LNCS
, vol.3672
, pp. 352-367
-
-
Terauchi, T.1
Aiken, A.2
-
31
-
-
84956989228
-
A type-based approach to program security
-
Proceedings of TAPSOFT'97, Springer
-
D. Volpano and G. Smith. A type-based approach to program security. In Proceedings of TAPSOFT'97, volume 1214 in LNCS, pages 607-621. Springer, 1997.
-
(1997)
LNCS
, vol.1214
, pp. 607-621
-
-
Volpano, D.1
Smith, G.2
-
32
-
-
33750259675
-
Relational separation logic
-
To appear
-
H. Yang. Relational separation logic. Theoretical Comput. Sci., 2004. To appear.
-
(2004)
Theoretical Comput. Sci.
-
-
Yang, H.1
|