메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 155-169

Using access control for secure information flow in a Java-like language

Author keywords

Access control; Authorization; Computer science; Computer security; Engineering profession; Information analysis; Information security; Inspection; Java; Permission

Indexed keywords

COMPUTATIONAL LINGUISTICS; COMPUTER SCIENCE; INFORMATION ANALYSIS; INSPECTION; JAVA PROGRAMMING LANGUAGE; PROFESSIONAL ASPECTS; SECURITY OF DATA; SECURITY SYSTEMS; STATIC ANALYSIS;

EID: 33947655397     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2003.1212711     Document Type: Conference Paper
Times cited : (29)

References (25)
  • 4
    • 84948752619 scopus 로고    scopus 로고
    • Secure information flow and pointer confinement in a Java-like language
    • IEEE Computer Society Press
    • A. Banerjee and D. A. Naumann. Secure information flow and pointer confinement in a Java-like language. In IEEE Computer Security Foundations Workshop (CSFW), pages 253-270. IEEE Computer Society Press, 2002.
    • (2002) IEEE Computer Security Foundations Workshop (CSFW) , pp. 253-270
    • Banerjee, A.1    Naumann, D.A.2
  • 6
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-242, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-242
    • Denning, D.1
  • 13
    • 0038893943 scopus 로고    scopus 로고
    • Information flow vs. Resource access in the asynchronous pi-calculus
    • M. Hennessy and J. Riely. Information flow vs. resource access in the asynchronous pi-calculus. ACM Trans. Prog. Lang. Syst., 24(5):566-591, 2002.
    • (2002) ACM Trans. Prog. Lang. Syst. , vol.24 , Issue.5 , pp. 566-591
    • Hennessy, M.1    Riely, J.2
  • 14
    • 0034823079 scopus 로고    scopus 로고
    • A generic approach to the security of multi-threaded programs
    • Cape Breton, Nova Scotia, Canada, June IEEE Computer Society Press
    • H. Mantel and A. Sabelfeld. A generic approach to the security of multi-threaded programs. In Proceedings of the 14th IEEE Computer Security Foundations Workshop, pages 126-142, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society Press.
    • (2001) Proceedings of the 14th IEEE Computer Security Foundations Workshop , pp. 126-142
    • Mantel, H.1    Sabelfeld, A.2
  • 15
    • 0031682833 scopus 로고    scopus 로고
    • Complete, safe information flow with decentralized labels
    • A. Myers and B. Liskov. Complete, safe information flow with decentralized labels. In IEEE Symposium on Security and Privacy, pages 186-197, 1998.
    • (1998) IEEE Symposium on Security and Privacy , pp. 186-197
    • Myers, A.1    Liskov, B.2
  • 19
    • 84945270736 scopus 로고    scopus 로고
    • A systematic approach to static access control
    • D. Sands, editor, Proceedings of the 10th European Symposium on Programming (ESOP'01), Springer Verlag, Apr.
    • F. Pottier, C. Skalka, and S. Smith. A systematic approach to static access control. In D. Sands, editor, Proceedings of the 10th European Symposium on Programming (ESOP'01), volume 2028 of Lecture Notes in Computer Science, pages 30-45. Springer Verlag, Apr. 2001.
    • (2001) Lecture Notes in Computer Science , vol.2028 , pp. 30-45
    • Pottier, F.1    Skalka, C.2    Smith, S.3
  • 23
    • 0019658399 scopus 로고
    • Access flows: A protection model which integrates access control and information flow
    • A. Stoughton. Access flows: A protection model which integrates access control and information flow. In IEEE Symposium on Security and Privacy, pages 9-18, 1981.
    • (1981) IEEE Symposium on Security and Privacy , pp. 9-18
    • Stoughton, A.1
  • 24
    • 84956989228 scopus 로고    scopus 로고
    • A type-based approach to program security
    • Proceedings of TAPSOFT'97, Springer-Verlag
    • D. Volpano and G. Smith. A type-based approach to program security. In Proceedings of TAPSOFT'97, number 1214 in Lecture Notes in Computer Science, pages 607-621. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , Issue.1214 , pp. 607-621
    • Volpano, D.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.