메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 202-214

Managing policy updates in security-typed languages

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY POLICIES; TRANSACTION;

EID: 33947711323     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2006.17     Document Type: Conference Paper
Times cited : (40)

References (27)
  • 1
    • 33947655397 scopus 로고    scopus 로고
    • Using access control for secure information flow in a Java-like language
    • June
    • A. Banerjee and D. A. Naumann. Using access control for secure information flow in a Java-like language. In CSFW, June 2003.
    • (2003) CSFW
    • Banerjee, A.1    Naumann, D.A.2
  • 2
    • 33947674219 scopus 로고    scopus 로고
    • Cassandra: Flexible trust management and its application to electronic health records
    • Technical Report UCAM-CL-TR-648, University of Cambridge, Computer Laboratory
    • M. Y. Becker. Cassandra: flexible trust management and its application to electronic health records. Technical Report UCAM-CL-TR-648, University of Cambridge, Computer Laboratory, 2005.
    • (2005)
    • Becker, M.Y.1
  • 3
    • 33947653778 scopus 로고    scopus 로고
    • Flow Locks: Towards a Core Calculus for Dynamic Flow Policies
    • N. Broberg and D. Sands. Flow Locks: Towards a Core Calculus for Dynamic Flow Policies. In ESOP, 2006.
    • (2006) ESOP
    • Broberg, N.1    Sands, D.2
  • 4
    • 4944253990 scopus 로고    scopus 로고
    • Owned Policies for Information Security
    • H. Chen and S. Chong. Owned Policies for Information Security. In CSFW, 2004.
    • (2004) CSFW
    • Chen, H.1    Chong, S.2
  • 5
    • 14844300105 scopus 로고    scopus 로고
    • S. Chong and A. C. Myers. Security policies for downgrading. In CCS, 2004.
    • S. Chong and A. C. Myers. Security policies for downgrading. In CCS, 2004.
  • 7
    • 24144492346 scopus 로고    scopus 로고
    • Anonymity and information hiding in multiagent systems
    • J. Y. Halpern and K. R. O'Neill. Anonymity and information hiding in multiagent systems. J. Computer Security, 13(3):483-514, 2005.
    • (2005) J. Computer Security , vol.13 , Issue.3 , pp. 483-514
    • Halpern, J.Y.1    O'Neill, K.R.2
  • 10
    • 0343877448 scopus 로고
    • Metapolicies 1
    • H. H. Hosmer. Metapolicies 1. SIGSAC Review, 10(2-3): 18-43, 1992.
    • (1992) SIGSAC Review , vol.10 , Issue.2-3 , pp. 18-43
    • Hosmer, H.H.1
  • 11
    • 33947617835 scopus 로고    scopus 로고
    • Understanding SPKI/SDSI using first-order logic
    • N. Li and J. C. Mitchell. Understanding SPKI/SDSI using first-order logic. In CSFW, 2003.
    • (2003) CSFW
    • Li, N.1    Mitchell, J.C.2
  • 13
    • 28144441375 scopus 로고    scopus 로고
    • On declassification and the nondisclosure policy
    • A. Matos and G. Boudol. On declassification and the nondisclosure policy. In CSFW, 2005.
    • (2005) CSFW
    • Matos, A.1    Boudol, G.2
  • 14
    • 33947628724 scopus 로고    scopus 로고
    • A. C. Myers, N. Nystrom, L. Zheng, and S. Zdancewic. Jif: Java + information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001.
    • A. C. Myers, N. Nystrom, L. Zheng, and S. Zdancewic. Jif: Java + information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001.
  • 16
    • 0348017041 scopus 로고    scopus 로고
    • Information flow inference for ML
    • Jan
    • F. Pettier and V. Simonet. Information flow inference for ML. TOPLAS, 25(1), Jan. 2003.
    • (2003) TOPLAS , vol.25 , Issue.1
    • Pettier, F.1    Simonet, V.2
  • 17
    • 33947614726 scopus 로고    scopus 로고
    • access control
    • Role based access control, http://csrc.nist.gov/rbac/, 2006.
    • (2006) Role based
  • 18
    • 84876750326 scopus 로고    scopus 로고
    • AtomCaml: First-Class Atomicity via Rollback
    • M. F. Ringenburg and D. Grossman. AtomCaml: First-Class Atomicity via Rollback. In ICFP, 2005.
    • (2005) ICFP
    • Ringenburg, M.F.1    Grossman, D.2
  • 20
    • 0029203481 scopus 로고
    • Software transactional memory
    • N. Shavit and D. Touitou. Software transactional memory. In PODC, 1995.
    • (1995) PODC
    • Shavit, N.1    Touitou, D.2
  • 21
    • 33745943942 scopus 로고    scopus 로고
    • Managing policy updates in security-typed languages
    • Technical Report CS-TR-4793, University of Maryland
    • N. Swamy, M. Hicks, S. Tse, and S. Zdancewic. Managing policy updates in security-typed languages. Technical Report CS-TR-4793, University of Maryland, 2006. www.cs.umd.edu/~nswamy/rx/tr.pdf.
    • (2006)
    • Swamy, N.1    Hicks, M.2    Tse, S.3    Zdancewic, S.4
  • 23
    • 24644494868 scopus 로고    scopus 로고
    • Designing a security-typed language with certificate-based declassification
    • ESOP
    • S. Tse and S. Zdancewic. Designing a security-typed language with certificate-based declassification. In ESOP, Lecture Notes in Computer Science, 2005.
    • (2005) Lecture Notes in Computer Science
    • Tse, S.1    Zdancewic, S.2
  • 25
    • 33749560808 scopus 로고    scopus 로고
    • Transactional monitors for concurrent objects
    • A. Welc, S. Jagannathan, and A. L. Hosking. Transactional monitors for concurrent objects. In ECOOP, 2004.
    • (2004) ECOOP
    • Welc, A.1    Jagannathan, S.2    Hosking, A.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.