메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 217-229

Noninterference in the presence of non-opaque pointers

Author keywords

[No Author keywords available]

Indexed keywords

BINARY CODES; COMPUTATIONAL METHODS; INFORMATION DISSEMINATION; JAVA PROGRAMMING LANGUAGE; OBJECT RECOGNITION;

EID: 33947687258     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2006.19     Document Type: Conference Paper
Times cited : (17)

References (11)
  • 3
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based access control for secure information flow
    • sep
    • Anindya Banerjee and David Naumann. Stack-based access control for secure information flow. Journal of Functional Programming, pages 131-177, sep 2005.
    • (2005) Journal of Functional Programming , pp. 131-177
    • Banerjee, A.1    Naumann, D.2
  • 5
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 7
    • 33947671397 scopus 로고    scopus 로고
    • Timing aware information flow security for a javacard-like bytecode
    • Fausto Spoto, editor, Elsevier, April
    • Daniel Hedin and David Sands. Timing aware information flow security for a javacard-like bytecode. In Fausto Spoto, editor, BYTECODE'05, ENTCS. Elsevier, April 2005.
    • (2005) BYTECODE'05, ENTCS
    • Hedin, D.1    Sands, D.2
  • 11
    • 0003025818 scopus 로고
    • Asyntactic approach to type soundness
    • Andrew K. Wright and Matthias Felleisen. Asyntactic approach to type soundness. Information and Computation, 115(1):38-94, 1994.
    • (1994) Information and Computation , vol.115 , Issue.1 , pp. 38-94
    • Wright, A.K.1    Felleisen, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.