-
1
-
-
33947655397
-
Using access control for secure information flow in a Java-like language
-
June
-
A. Banerjee and D. A. Naumann. Using access control for secure information flow in a Java-like language. In CSFW, June 2003.
-
(2003)
CSFW
-
-
Banerjee, A.1
Naumann, D.A.2
-
2
-
-
33947674219
-
Cassandra: Flexible trust management and its application to electronic health records
-
Technical Report UCAM-CL-TR-648, University of Cambridge, Computer Laboratory
-
M. Y. Becker. Cassandra: flexible trust management and its application to electronic health records. Technical Report UCAM-CL-TR-648, University of Cambridge, Computer Laboratory, 2005.
-
(2005)
-
-
Becker, M.Y.1
-
3
-
-
33947653778
-
Flow Locks: Towards a Core Calculus for Dynamic Flow Policies
-
N. Broberg and D. Sands. Flow Locks: Towards a Core Calculus for Dynamic Flow Policies. In ESOP, 2006.
-
(2006)
ESOP
-
-
Broberg, N.1
Sands, D.2
-
4
-
-
4944253990
-
Owned Policies for Information Security
-
H. Chen and S. Chong. Owned Policies for Information Security. In CSFW, 2004.
-
(2004)
CSFW
-
-
Chen, H.1
Chong, S.2
-
5
-
-
14844300105
-
-
S. Chong and A. C. Myers. Security policies for downgrading. In CCS, 2004.
-
S. Chong and A. C. Myers. Security policies for downgrading. In CCS, 2004.
-
-
-
-
6
-
-
0003593599
-
-
IETF RFC 2693
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory. IETF RFC 2693, 1999.
-
(1999)
SPKI certificate theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
7
-
-
24144492346
-
Anonymity and information hiding in multiagent systems
-
J. Y. Halpern and K. R. O'Neill. Anonymity and information hiding in multiagent systems. J. Computer Security, 13(3):483-514, 2005.
-
(2005)
J. Computer Security
, vol.13
, Issue.3
, pp. 483-514
-
-
Halpern, J.Y.1
O'Neill, K.R.2
-
10
-
-
0343877448
-
Metapolicies 1
-
H. H. Hosmer. Metapolicies 1. SIGSAC Review, 10(2-3): 18-43, 1992.
-
(1992)
SIGSAC Review
, vol.10
, Issue.2-3
, pp. 18-43
-
-
Hosmer, H.H.1
-
11
-
-
33947617835
-
Understanding SPKI/SDSI using first-order logic
-
N. Li and J. C. Mitchell. Understanding SPKI/SDSI using first-order logic. In CSFW, 2003.
-
(2003)
CSFW
-
-
Li, N.1
Mitchell, J.C.2
-
13
-
-
28144441375
-
On declassification and the nondisclosure policy
-
A. Matos and G. Boudol. On declassification and the nondisclosure policy. In CSFW, 2005.
-
(2005)
CSFW
-
-
Matos, A.1
Boudol, G.2
-
14
-
-
33947628724
-
-
A. C. Myers, N. Nystrom, L. Zheng, and S. Zdancewic. Jif: Java + information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001.
-
A. C. Myers, N. Nystrom, L. Zheng, and S. Zdancewic. Jif: Java + information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001.
-
-
-
-
16
-
-
0348017041
-
Information flow inference for ML
-
Jan
-
F. Pettier and V. Simonet. Information flow inference for ML. TOPLAS, 25(1), Jan. 2003.
-
(2003)
TOPLAS
, vol.25
, Issue.1
-
-
Pettier, F.1
Simonet, V.2
-
17
-
-
33947614726
-
-
access control
-
Role based access control, http://csrc.nist.gov/rbac/, 2006.
-
(2006)
Role based
-
-
-
18
-
-
84876750326
-
AtomCaml: First-Class Atomicity via Rollback
-
M. F. Ringenburg and D. Grossman. AtomCaml: First-Class Atomicity via Rollback. In ICFP, 2005.
-
(2005)
ICFP
-
-
Ringenburg, M.F.1
Grossman, D.2
-
20
-
-
0029203481
-
Software transactional memory
-
N. Shavit and D. Touitou. Software transactional memory. In PODC, 1995.
-
(1995)
PODC
-
-
Shavit, N.1
Touitou, D.2
-
21
-
-
33745943942
-
Managing policy updates in security-typed languages
-
Technical Report CS-TR-4793, University of Maryland
-
N. Swamy, M. Hicks, S. Tse, and S. Zdancewic. Managing policy updates in security-typed languages. Technical Report CS-TR-4793, University of Maryland, 2006. www.cs.umd.edu/~nswamy/rx/tr.pdf.
-
(2006)
-
-
Swamy, N.1
Hicks, M.2
Tse, S.3
Zdancewic, S.4
-
23
-
-
24644494868
-
Designing a security-typed language with certificate-based declassification
-
ESOP
-
S. Tse and S. Zdancewic. Designing a security-typed language with certificate-based declassification. In ESOP, Lecture Notes in Computer Science, 2005.
-
(2005)
Lecture Notes in Computer Science
-
-
Tse, S.1
Zdancewic, S.2
-
24
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|