-
1
-
-
0032681509
-
-
M. Abadi, A. Banerjee, N. Heintze, J.G. Riecke, A core calculus of dependency, in: ACM Symposium on Principles of Programming Languages, POPL, 1999, pp. 147-160
-
-
-
-
2
-
-
33745806932
-
-
T. Amtoft, S. Bandhakavi, A. Banerjee, A logic for information flow in object-oriented programs, in: ACM Symposium on Principles of Programming Languages, POPL, 2006, pp. 91-102
-
-
-
-
3
-
-
33751112057
-
-
T. Amtoft, A. Banerjee, Information flow analysis in logical form, Tech. Rep. CIS TR 2004-3, Kansas State University, April 2004. URL: http://www.cis.ksu.edu/~ab/Publications/ifalftr.pdf
-
-
-
-
4
-
-
35048839749
-
Information flow analysis in logical form
-
Static Analysis Symposium. SAS, Springer-Verlag
-
Amtoft T., and Banerjee A. Information flow analysis in logical form. Static Analysis Symposium. SAS. Lecture Notes in Computer Science vol. 3148 (2004), Springer-Verlag 100-115
-
(2004)
Lecture Notes in Computer Science
, vol.3148
, pp. 100-115
-
-
Amtoft, T.1
Banerjee, A.2
-
6
-
-
17044429386
-
Stack-based access control and secure information flow
-
Language-based Security (special issue)
-
Banerjee A., and Naumann D.A. Stack-based access control and secure information flow. Language-based Security. Journal of Functional Programming 15 2 (2005) 131-177 (special issue)
-
(2005)
Journal of Functional Programming
, vol.15
, Issue.2
, pp. 131-177
-
-
Banerjee, A.1
Naumann, D.A.2
-
8
-
-
33751082194
-
-
D. Bell, L. LaPadula, Secure computer systems: Mathematical foundations, Tech. Rep. MTR-2547, MITRE Corp., 1973
-
-
-
-
9
-
-
0036555709
-
Information flow for Algol-like languages
-
Clark D., Hankin C., and Hunt S. Information flow for Algol-like languages. Computer Languages 28 1 (2002) 3-28
-
(2002)
Computer Languages
, vol.28
, Issue.1
, pp. 3-28
-
-
Clark, D.1
Hankin, C.2
Hunt, S.3
-
10
-
-
0001760770
-
Information transmission in sequential programs
-
DeMillo R.A., Dobkin D.P., Jones A.K., and Lipton R.J. (Eds), Academic Press
-
Cohen E.S. Information transmission in sequential programs. In: DeMillo R.A., Dobkin D.P., Jones A.K., and Lipton R.J. (Eds). Foundations of Secure Computation (1978), Academic Press 297-335
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
11
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
POPL, ACM Press, New York, NY
-
Cousot P., and Cousot R. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. ACM Symposium on Principles of Programming Languages. POPL (1977), ACM Press, New York, NY 238-252
-
(1977)
ACM Symposium on Principles of Programming Languages
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
12
-
-
84878892024
-
Automatic synthesis of optimal invariant assertions: mathematical foundations
-
Proceedings of the ACM Symposium on Artificial Intelligence and Programming Languages, ACM Press
-
Cousot P., and Cousot R. Automatic synthesis of optimal invariant assertions: mathematical foundations. Proceedings of the ACM Symposium on Artificial Intelligence and Programming Languages. SIGPLAN Notices vol. 12 (1977), ACM Press 1-12
-
(1977)
SIGPLAN Notices
, vol.12
, pp. 1-12
-
-
Cousot, P.1
Cousot, R.2
-
13
-
-
33751077617
-
-
Á. Darvas, R. Hähnle, D. Sands, A theorem proving approach to analysis of secure information flow, Tech. Rep. 2004-01, Department of Computing Science, Chalmers University of Technology and Göteborg University, 2004, a fuller version of a paper appearing in Workshop on Issues in the Theory of Security, 2003
-
-
-
-
14
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning D., and Denning P. Certification of programs for secure information flow. Communications of the ACM 20 7 (1977) 504-513
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.1
Denning, P.2
-
15
-
-
2442507870
-
-
R. Giacobazzi, I. Mastroeni, Abstract non-interference: Parameterizing non-interference by abstract interpretation, in: ACM Symposium on Principles of Programming Languages, POPL, 2004, pp. 186-197
-
-
-
-
16
-
-
0020299523
-
-
J. Goguen, J. Meseguer, Security policies and security models, in: Proc. IEEE Symp. on Security and Privacy, 1982, pp. 11-20
-
-
-
-
17
-
-
0031701347
-
-
N. Heintze, J.G. Riecke, The SLam calculus: Programming with secrecy and integrity, in: ACM Symposium on Principles of Programming Languages, POPL, 1998, pp. 365-377
-
-
-
-
18
-
-
84976858409
-
Binding time analysis: A new PERspective
-
Partial Evaluation and Semantics-Based Program Manipulation. PEPM
-
Hunt S., and Sands D. Binding time analysis: A new PERspective. Partial Evaluation and Semantics-Based Program Manipulation. PEPM. SIGPLAN Notices 26 9 (1991) 154-165
-
(1991)
SIGPLAN Notices
, vol.26
, Issue.9
, pp. 154-165
-
-
Hunt, S.1
Sands, D.2
-
20
-
-
0035035498
-
-
S. Ishtiaq, P.W. O'Hearn, BI as an assertion language for mutable data structures, in: ACM Symposium on Principles of Programming Languages, POPL, 2001, pp. 14-26
-
-
-
-
22
-
-
0023231848
-
-
D. McCullough, Specifications for multi-level security and a hook-up, in: IEEE Symposium on Security and Privacy, 1987, pp. 161-166
-
-
-
-
24
-
-
84944269268
-
Local reasoning about programs that alter data structures
-
Computer Science Logic, Springer-Verlag
-
O'Hearn P., Reynolds J., and Yang H. Local reasoning about programs that alter data structures. Computer Science Logic. Lecture Notes in Computer Science vol. 2142 (2001), Springer-Verlag 1-19
-
(2001)
Lecture Notes in Computer Science
, vol.2142
, pp. 1-19
-
-
O'Hearn, P.1
Reynolds, J.2
Yang, H.3
-
25
-
-
2442441012
-
-
P. O'Hearn, H. Yang, J. Reynolds, Separation and information hiding, in: ACM Symposium on Principles of Programming Languages, POPL, 2004, pp. 268-280
-
-
-
-
28
-
-
0036051192
-
Separation logic: A logic for shared mutable data structures
-
LICS, IEEE Computer Society Press
-
Reynolds J.C. Separation logic: A logic for shared mutable data structures. IEEE Symposium on Logic in Computer Science. LICS (2002), IEEE Computer Society Press 55-74
-
(2002)
IEEE Symposium on Logic in Computer Science
, pp. 55-74
-
-
Reynolds, J.C.1
-
29
-
-
35048828759
-
A model for delimited information release
-
Proceedings of the International Symposium on Software Security. ISSS, Springer-Verlag
-
Sabelfeld A., and Myers A. A model for delimited information release. Proceedings of the International Symposium on Software Security. ISSS. Lecture Notes in Computer Science vol. 3233 (2004), Springer-Verlag 174-191
-
(2004)
Lecture Notes in Computer Science
, vol.3233
, pp. 174-191
-
-
Sabelfeld, A.1
Myers, A.2
-
31
-
-
0035276729
-
A Per model of secure information flow in sequential programs
-
Sabelfeld A., and Sands D. A Per model of secure information flow in sequential programs. Higher-order and Symbolic Computation 14 1 (2001) 59-91
-
(2001)
Higher-order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
32
-
-
84887886825
-
Structure-preserving binary relations for program abstraction
-
The Essence of Computation: Complexity, Analysis, Transformation - Essays dedicated to Neil D. Jones, Springer-Verlag
-
Schmidt D.A. Structure-preserving binary relations for program abstraction. The Essence of Computation: Complexity, Analysis, Transformation - Essays dedicated to Neil D. Jones. Lecture Notes in Computer Science no. 2566 (2002), Springer-Verlag 245-265
-
(2002)
Lecture Notes in Computer Science
, vol.2566
, pp. 245-265
-
-
Schmidt, D.A.1
-
34
-
-
84956989228
-
A type-based approach to program security
-
Proceedings of Theory and Practice of Software Development. TAPSOFT'97, Springer-Verlag
-
Volpano D., and Smith G. A type-based approach to program security. Proceedings of Theory and Practice of Software Development. TAPSOFT'97. Lecture Notes in Computer Science no. 1214 (1997), Springer-Verlag 607-621
-
(1997)
Lecture Notes in Computer Science
, vol.1214
, pp. 607-621
-
-
Volpano, D.1
Smith, G.2
|