-
2
-
-
34249820299
-
-
Isabelle Attali, Denis Caromel, and Arnaud Contes. Hierarchical and declarative security for grid applications. In International Conference On High Performance Computing, HIPC, Hyderabad, India, December 17-20, Springer Verlag, 2003. Lecture Notes in Computer Science, LNCS
-
-
-
-
3
-
-
33947655397
-
-
Anindya Banerjee and David A. Naumann. Using access control for secure information flow in a java-like language. In 16th IEEE Computer Security Foundations Workshop (CSFW-16), July 2003
-
-
-
-
4
-
-
34249808866
-
-
David E. Bell and Leonard J. LaPadula. Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997 Rev. 1, The MITRE Corporation, Bedford, MA, March 1976
-
-
-
-
5
-
-
0346203703
-
Exception-based information flow control in object-oriented systems
-
Bertino E., De Capitani di Vimercati S., Ferrari E., and Samarati P. Exception-based information flow control in object-oriented systems. ACM Transactions on Information and System Security (TISSEC) 1 1 (November 1998) 26-65
-
(1998)
ACM Transactions on Information and System Security (TISSEC)
, vol.1
, Issue.1
, pp. 26-65
-
-
Bertino, E.1
De Capitani di Vimercati, S.2
Ferrari, E.3
Samarati, P.4
-
9
-
-
0011837296
-
-
Agostino Cortesi and Riccardo Focardi. Information flow security in mobile ambients. In International Workshop on Concurrency and Coordination (ConCoord'01), volume 54 of Electronic Notes on Theoretical Computer Science. Elsevier, July 2001
-
-
-
-
11
-
-
34249791523
-
-
XACML eXtensible Access Control Markup Language
-
XACML eXtensible Access Control Markup Language. http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml
-
-
-
-
12
-
-
84988393004
-
Classification of security properties (part i: Information flow)
-
Foundations of Security Analysis and Design (FOSAD 2000) - Tutorial Lectures, Springer-Verlag
-
Focardi R., and Gorrieri R. Classification of security properties (part i: Information flow). Foundations of Security Analysis and Design (FOSAD 2000) - Tutorial Lectures. Lecture Notes in Computer Science volume 2171 (2001), Springer-Verlag 331-396
-
(2001)
Lecture Notes in Computer Science
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
13
-
-
34249825530
-
-
Matthew Hennessy. The security picalculus and non-interference. Journal of Logic and Algebraic Programming, 2003. To Appear
-
-
-
-
14
-
-
34249818217
-
-
Matthew Hennessy and James Riely. Information flow vs. resource access in the asynchronous pi-calculus. Computer Science Technical Report 2000:03, The University of Sussex, 2000
-
-
-
-
15
-
-
17644369110
-
-
Peter Herrmann. Information flow analysis of component-structured applications. In 17th Annual Computer Security Applications Conference. The Applied Computer Security Associates (ACSA), 2001
-
-
-
-
16
-
-
84947269249
-
Secure information flow as typed process behaviour
-
Programming Languages and Systems, Springer-Verlag
-
Honda K., Vasconcelos V., and Yoshida N. Secure information flow as typed process behaviour. Programming Languages and Systems. Lecture Notes in Computer Science volume 1782 (2000), Springer-Verlag
-
(2000)
Lecture Notes in Computer Science
, vol.1782
-
-
Honda, K.1
Vasconcelos, V.2
Yoshida, N.3
-
17
-
-
78651546803
-
A multilevel secure object-oriented data model
-
Abrams M.D., Jajodia S., and Podell H.J. (Eds), IEEE Computer Society Press
-
Jajodia S., Kogan B., and Sandhu R.S. A multilevel secure object-oriented data model. In: Abrams M.D., Jajodia S., and Podell H.J. (Eds). Information Security: An Integrated Collection of Essays (1995), IEEE Computer Society Press 596-616
-
(1995)
Information Security: An Integrated Collection of Essays
, pp. 596-616
-
-
Jajodia, S.1
Kogan, B.2
Sandhu, R.S.3
-
19
-
-
44049113210
-
-
Robin Milner, Joachim Parrow, and David Walker. A calculus of mobile processes, part I/II. 100:1-77, September 1992
-
-
-
-
20
-
-
0032646625
-
-
Andrew C. Myers. Jflow: Practical mostly-static information flow control. In 26th ACM Symposium on Principles of Programming Languages (POPL 99), pages 228-241. ACM Press, January 1999
-
-
-
-
21
-
-
34249813147
-
-
ProActive. http://www-sop.inria.fr/oasis/proactive/
-
-
-
ProActive1
-
22
-
-
84885715358
-
The impact of synchronisation on secure information flow in concurrent programs
-
4th International Conference on Perspectives of System Informatics, Springer-Verlag
-
Sabelfeld A. The impact of synchronisation on secure information flow in concurrent programs. 4th International Conference on Perspectives of System Informatics. Lecture Notes in Computer Science volume 2244 (July 2001), Springer-Verlag
-
(2001)
Lecture Notes in Computer Science
, vol.2244
-
-
Sabelfeld, A.1
-
23
-
-
0031185890
-
Information flow control in object-oriented systems
-
Samarati P., Bertino E., Ciampichetti A., and Jajodia S. Information flow control in object-oriented systems. IEEE Transactions on Knowledge and Data Engineering 9 4 (July-August 1997) 524-538
-
(1997)
IEEE Transactions on Knowledge and Data Engineering
, vol.9
, Issue.4
, pp. 524-538
-
-
Samarati, P.1
Bertino, E.2
Ciampichetti, A.3
Jajodia, S.4
-
24
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
Foundations of Security Analysis and Design : Tutorial Lectures, Springer-Verlag
-
Samarati P., and De Capitani Di Vimercati S. Access control: Policies, models, and mechanisms. Foundations of Security Analysis and Design : Tutorial Lectures. Lecture Notes in Computer Science volume 2171 (2001), Springer-Verlag 137
-
(2001)
Lecture Notes in Computer Science
, vol.2171
, pp. 137
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
25
-
-
0036036793
-
-
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers. Untrusted hosts and confidentiality: Secure program partitioning. In 18th ACM Symposium on Operating System Principles (SOSP '01), volume 35, pages 1-14. ACM Press, October 2001
-
-
-
|