-
1
-
-
0003400251
-
Secure computer systems: Unified exposition and Multics interpretation
-
Technical Report MTR-2997, MTTRE Corp
-
D.Bell and L. LaPadula, "Secure computer systems: Unified exposition and Multics interpretation", Technical Report MTR-2997, MTTRE Corp, 1997.
-
(1997)
-
-
Bell, D.1
LaPadula, L.2
-
3
-
-
11344288540
-
Quantified Interference for a While Language, Elsevier
-
D. Clark and S. Hunt and P. Malacaria, "Quantified Interference for a While Language", Elsevier, Electronic Notes in Theoretical Computer Science 112, pages 149-166, 2005.
-
(2005)
Electronic Notes in Theoretical Computer Science
, vol.112
, pp. 149-166
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
4
-
-
20844445346
-
Quantitative Information Flow, Relations and Polymorphic Types
-
D. Clark and S. Hunt and P. Malacaria, "Quantitative Information Flow, Relations and Polymorphic Types", Journal of Logic and Computation, Special Issue on Lambda-calculus, type theory and. natural language, 2005, volume 18, number 2, pages 181-199
-
(2005)
Journal of Logic and Computation, Special Issue on Lambda-calculus, type theory and. natural language
, vol.18
, Issue.2
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
7
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
May
-
D. E. R. Denning, "A Lattice Model of Secure Information Flow", Communications of the ACM, volume 19, number 5, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
-
-
Denning, D.E.R.1
-
11
-
-
0020299523
-
Security Policies and Security Models
-
IEEE Computer Society Press
-
J. Goguen and J. Meseguer, "Security Policies and Security Models", IEEE Symposium on Security and Privacy, pages 11-20, IEEE Computer Society Press, 1982.
-
(1982)
IEEE Symposium on Security and Privacy
, pp. 11-20
-
-
Goguen, J.1
Meseguer, J.2
-
12
-
-
0032047481
-
A Logical Approach to Multilevel Security of Probabilistic Systems
-
J. W. Gray III and P. F. Syverson, "A Logical Approach to Multilevel Security of Probabilistic Systems", Distributed Computing, volume 11, number 2, 1998, pages 73-90.
-
(1998)
Distributed Computing
, vol.11
, Issue.2
, pp. 73-90
-
-
Gray III, J.W.1
Syverson, P.F.2
-
13
-
-
0026157130
-
Toward a Mathematical Foundation for Information Flow Security
-
Oakland, CA, May
-
W. Gray, III, James, "Toward a Mathematical Foundation for Information Flow Security", Proc. 1991 IEEE Symposium on Security and Privacy, Oakland, CA, May1991, pages 21-34.
-
(1991)
Proc. 1991 IEEE Symposium on Security and Privacy
, pp. 21-34
-
-
Gray III, W.1
James2
-
14
-
-
33846479311
-
-
S. Isthiaq and P.W. O'Hearn, BI as an assertion language for mutable data structures, pages = 14-26, 28th POPL London 2001.
-
S. Isthiaq and P.W. O'Hearn, "BI as an assertion language for mutable data structures", pages = "14-26", 28th POPL London 2001.
-
-
-
-
21
-
-
0012721213
-
LICS'02
-
Invited Paper
-
J. Reynolds, "Separation logic: a logic for shared mutable data structures", Invited Paper, LICS'02, 2002.
-
(2002)
-
-
Reynolds, J.1
-
22
-
-
0034829266
-
Non-interference, who needs it?
-
Nova Scotia, Canada, June
-
P. Y. A. Ryan and J. McLean and J. Millen and V. Gilgor, "Non-interference, who needs it?", Proceedings of the 14th IEEE Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, June 2001,
-
(2001)
Proceedings of the 14th IEEE Security Foundations Workshop, Cape Breton
-
-
Ryan, P.Y.A.1
McLean, J.2
Millen, J.3
Gilgor, V.4
-
23
-
-
84940644968
-
-
C. Shannon, A mathematical theory of communication, The Bell System Technical Journal, 27, July and October, 1948, pages 379-423 and 623-656.
-
C. Shannon, "A mathematical theory of communication", The Bell System Technical Journal, volume 27, July and October, 1948, pages 379-423 and 623-656.
-
-
-
-
24
-
-
84956989228
-
A Type-Based Approach to Program Security
-
Proceedings of TAPSOFT '97 Colloquium on Formal Approaches in Software Engineering, April
-
D. Volpano and G. Smith, "A Type-Based Approach to Program Security", Proceedings of TAPSOFT '97 (Colloquium on Formal Approaches in Software Engineering), April 1997, Lecture Notes in Computer Science, number 1214, pages 607-621.
-
(1997)
Lecture Notes in Computer Science
, Issue.1214
, pp. 607-621
-
-
Volpano, D.1
Smith, G.2
|