-
1
-
-
0032681509
-
A core calculus of dependency
-
M. Abadi, A. Banerjee, N. Heintze, and J. G. Riecke. A core calculus of dependency. In ACM Symposium on Principles of Programming Languages (POPL), pages 147-160, 1999.
-
(1999)
ACM Symposium on Principles of Programming Languages (POPL)
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
4
-
-
84948752619
-
Secure information flow and pointer confinement in a Java-like language
-
IEEE Computer Society Press
-
A. Banerjee and D. A. Naumann. Secure information flow and pointer confinement in a Java-like language. In IEEE Computer Security Foundations Workshop (CSFW), pages 253-270. IEEE Computer Society Press, 2002.
-
(2002)
IEEE Computer Security Foundations Workshop (CSFW)
, pp. 253-270
-
-
Banerjee, A.1
Naumann, D.A.2
-
6
-
-
0016949746
-
A lattice model of secure information flow
-
D. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-242, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-242
-
-
Denning, D.1
-
13
-
-
0038893943
-
Information flow vs. Resource access in the asynchronous pi-calculus
-
M. Hennessy and J. Riely. Information flow vs. resource access in the asynchronous pi-calculus. ACM Trans. Prog. Lang. Syst., 24(5):566-591, 2002.
-
(2002)
ACM Trans. Prog. Lang. Syst.
, vol.24
, Issue.5
, pp. 566-591
-
-
Hennessy, M.1
Riely, J.2
-
14
-
-
0034823079
-
A generic approach to the security of multi-threaded programs
-
Cape Breton, Nova Scotia, Canada, June IEEE Computer Society Press
-
H. Mantel and A. Sabelfeld. A generic approach to the security of multi-threaded programs. In Proceedings of the 14th IEEE Computer Security Foundations Workshop, pages 126-142, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society Press.
-
(2001)
Proceedings of the 14th IEEE Computer Security Foundations Workshop
, pp. 126-142
-
-
Mantel, H.1
Sabelfeld, A.2
-
15
-
-
0031682833
-
Complete, safe information flow with decentralized labels
-
A. Myers and B. Liskov. Complete, safe information flow with decentralized labels. In IEEE Symposium on Security and Privacy, pages 186-197, 1998.
-
(1998)
IEEE Symposium on Security and Privacy
, pp. 186-197
-
-
Myers, A.1
Liskov, B.2
-
19
-
-
84945270736
-
A systematic approach to static access control
-
D. Sands, editor, Proceedings of the 10th European Symposium on Programming (ESOP'01), Springer Verlag, Apr.
-
F. Pottier, C. Skalka, and S. Smith. A systematic approach to static access control. In D. Sands, editor, Proceedings of the 10th European Symposium on Programming (ESOP'01), volume 2028 of Lecture Notes in Computer Science, pages 30-45. Springer Verlag, Apr. 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2028
, pp. 30-45
-
-
Pottier, F.1
Skalka, C.2
Smith, S.3
-
23
-
-
0019658399
-
Access flows: A protection model which integrates access control and information flow
-
A. Stoughton. Access flows: A protection model which integrates access control and information flow. In IEEE Symposium on Security and Privacy, pages 9-18, 1981.
-
(1981)
IEEE Symposium on Security and Privacy
, pp. 9-18
-
-
Stoughton, A.1
-
24
-
-
84956989228
-
A type-based approach to program security
-
Proceedings of TAPSOFT'97, Springer-Verlag
-
D. Volpano and G. Smith. A type-based approach to program security. In Proceedings of TAPSOFT'97, number 1214 in Lecture Notes in Computer Science, pages 607-621. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, Issue.1214
, pp. 607-621
-
-
Volpano, D.1
Smith, G.2
-
25
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|