-
2
-
-
84879520825
-
-
G. Boudol and I. Castellani. Noninterference for concurrent programs. In Proc. ICALP'01, 2076 of LAO, pages 382-395. Springer-Verlag, July 2001.
-
G. Boudol and I. Castellani. Noninterference for concurrent programs. In Proc. ICALP'01, volume 2076 of LAO, pages 382-395. Springer-Verlag, July 2001.
-
-
-
-
3
-
-
0037014243
-
Non-interference for concurrent programs and thread systems
-
June
-
G. Boudol and I. Castellani. Non-interference for concurrent programs and thread systems. Theoretical Computer Science, 281(1): 109-130, June 2002.
-
(2002)
Theoretical Computer Science
, vol.281
, Issue.1
, pp. 109-130
-
-
Boudol, G.1
Castellani, I.2
-
4
-
-
0001760770
-
Information transmission in sequential programs
-
R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Academic Press
-
E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
5
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
8
-
-
84988393004
-
Classification of security properties (part I: Information flow)
-
R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, of, Springer-Verlag
-
R. Focardi and R. Gorrieri. Classification of security properties (part I: Information flow). In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 331-396. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
11
-
-
84947269249
-
Secure information flow as typed process behaviour
-
Proc. European Symp. on Programming, of, Springer-Verlag
-
K. Honda, V. Vasconcelos, and N. Yoshida. Secure information flow as typed process behaviour. In Proc. European Symp. on Programming, volume 1782 of LNCS, pages 180-199. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1782
, pp. 180-199
-
-
Honda, K.1
Vasconcelos, V.2
Yoshida, N.3
-
14
-
-
33947663590
-
Networking, user experience, and threads
-
J. Knudsen. Networking, user experience, and threads. Sun Technical Articles and Tips http://developers.sun.com/techtopics/ mobility/midp/articles/ threading/, 2002.
-
(2002)
Sun Technical Articles and Tips
-
-
Knudsen, J.1
-
15
-
-
33947668912
-
Preventing screen lockups of blocking operations
-
Q. H. Mahmoud. Preventing screen lockups of blocking operations. Sun Technical Articles and Tips http://developers.sun.com/techtopics/ mobility/midp/ttips/screenlock/, 2004.
-
(2004)
Sun Technical Articles and Tips
-
-
Mahmoud, Q.H.1
-
16
-
-
0023231848
-
Specifications for multi-level security and hook-up property
-
Apr
-
D. McCullough. Specifications for multi-level security and hook-up property. In Proc. IEEE Symp. on Security and Privacy, pages 161-166, Apr. 1987.
-
(1987)
Proc. IEEE Symp. on Security and Privacy
, pp. 161-166
-
-
McCullough, D.1
-
17
-
-
0025211594
-
The specification and modeling of computer security
-
Jan
-
J. McLean. The specification and modeling of computer security. Computer, 23(1):9-16, Jan. 1990.
-
(1990)
Computer
, vol.23
, Issue.1
, pp. 9-16
-
-
McLean, J.1
-
18
-
-
33947613648
-
-
A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001-2006.
-
A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001-2006.
-
-
-
-
19
-
-
84948737028
-
A simple view of type-secure information flow in the pi-calculus
-
June
-
F. Pottier. A simple view of type-secure information flow in the pi-calculus. In Proc. IEEE Computer Security Foundations Workshop, pages 320-330, June 2002.
-
(2002)
Proc. IEEE Computer Security Foundations Workshop
, pp. 320-330
-
-
Pottier, F.1
-
21
-
-
33947697220
-
Security for multithreaded programs under cooperative scheduling
-
Proc. Andrei Ershov International. Conference on Perspectives of System Informatics, Springer-Verlag, June
-
A. Russo and A. Sabelfeld. Security for multithreaded programs under cooperative scheduling. In Proc. Andrei Ershov International. Conference on Perspectives of System Informatics, LNCS. Springer-Verlag, June 2006.
-
(2006)
LNCS
-
-
Russo, A.1
Sabelfeld, A.2
-
22
-
-
0012886288
-
Mathematical models of computer security -tutorial lectures
-
R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, of, Springer-Verlag
-
P. Ryan. Mathematical models of computer security -tutorial lectures. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 1-62. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2171
, pp. 1-62
-
-
Ryan, P.1
-
23
-
-
84885715358
-
The impact of synchronisation on secure information flow in concurrent programs
-
Proc. Andrei Ershov International Conference on Perspectives of System Informatics, of, Springer-Verlag, July
-
A. Sabelfeld. The impact of synchronisation on secure information flow in concurrent programs. In Proc. Andrei Ershov International Conference on Perspectives of System Informatics, volume 2244 of LNCS, pages 225-239. Springer-Verlag, July 2001.
-
(2001)
LNCS
, vol.2244
, pp. 225-239
-
-
Sabelfeld, A.1
-
24
-
-
84958755151
-
Static confidentiality enforcement for distributed programs
-
Proc. Symp. on Static Analysis, of, Springer-Verlag, Sept
-
A. Sabelfeld and H. Mantel. Static confidentiality enforcement for distributed programs. In Proc. Symp. on Static Analysis, volume 2477 of LNCS, pages 376-394. Springer-Verlag, Sept. 2002.
-
(2002)
LNCS
, vol.2477
, pp. 376-394
-
-
Sabelfeld, A.1
Mantel, H.2
-
27
-
-
33947690755
-
-
V. Simonet. The Flow Caml system. Software release. Located at http://cristal.inria.fr/~simonet /soft/flowcaml/, July 2003.
-
V. Simonet. The Flow Caml system. Software release. Located at http://cristal.inria.fr/~simonet /soft/flowcaml/, July 2003.
-
-
-
-
29
-
-
18544362925
-
Probabilistic noninterference through weak probabilistic bisimulation
-
G. Smith. Probabilistic noninterference through weak probabilistic bisimulation. In Proc. IEEE Computer Security Foundations Workshop, pages 3-13, 2003.
-
(2003)
Proc. IEEE Computer Security Foundations Workshop
, pp. 3-13
-
-
Smith, G.1
-
32
-
-
0033330060
-
Probabilistic noninterference in a concurrent language
-
Nov
-
D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. J. Computer Security, 7(2-3):231-253, Nov. 1999.
-
(1999)
J. Computer Security
, vol.7
, Issue.2-3
, pp. 231-253
-
-
Volpano, D.1
Smith, G.2
-
33
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3): 167-187, 1996.
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|