-
2
-
-
35048839749
-
Information flow analysis in logical form
-
Proceedings of the 11th Static Analysis Symposium SAS'04, of, Springer
-
T. Amtoft and A. Banerjee, Information flow analysis in logical form, in: Proceedings of the 11th Static Analysis Symposium (SAS'04), volume 3148 of LNCS, Springer, 2004, pp. 100-115.
-
(2004)
LNCS
, vol.3148
, pp. 100-115
-
-
Amtoft, T.1
Banerjee, A.2
-
5
-
-
3242706680
-
Verifying persistent security properties
-
A. Bossi, R. Focardi, C. Piazza and S. Rossi, Verifying persistent security properties, Computer Languages, Systems and Structures 30(3-4) (2004), 231-258.
-
(2004)
Computer Languages, Systems and Structures
, vol.30
, Issue.3-4
, pp. 231-258
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
6
-
-
84879520825
-
Noninterference for concurrent programs
-
Proc. of Int. Colloquium on Automata, Languages and Progmmming ICALP'01, F. Orejas, P.G. Spirakis and J. van Leeuwen, eds, of, Springer
-
G. Boudol and I. Castellani, Noninterference for concurrent programs, in: Proc. of Int. Colloquium on Automata, Languages and Progmmming (ICALP'01), F. Orejas, P.G. Spirakis and J. van Leeuwen, eds, volume 2076 of LNCS, Springer, 2001, pp. 382-395.
-
(2001)
LNCS
, vol.2076
, pp. 382-395
-
-
Boudol, G.1
Castellani, I.2
-
7
-
-
0037014243
-
Noninterference for concurrent programs and tread systems
-
G. Boudol and I. Castellani, Noninterference for concurrent programs and tread systems, Theoretical Computer Science 281(1) (2002), 109-130.
-
(2002)
Theoretical Computer Science
, vol.281
, Issue.1
, pp. 109-130
-
-
Boudol, G.1
Castellani, I.2
-
8
-
-
85029837057
-
Quantifier elimination for real closed fields by cylindrical algebraic decomposition
-
2nd Gl Conf. on Automata Theory and Formal Languages, H. Barkhage, ed, of, Springer
-
G.E. Collins, Quantifier elimination for real closed fields by cylindrical algebraic decomposition, in: 2nd Gl Conf. on Automata Theory and Formal Languages, H. Barkhage, ed., volume 33 of LNCS, Springer, 1975, pp. 134-183.
-
(1975)
LNCS
, vol.33
, pp. 134-183
-
-
Collins, G.E.1
-
9
-
-
80052985571
-
Partial cylindrical algebraic decomposition for quantifier elimination
-
G.E. Collins and H. Hong, Partial cylindrical algebraic decomposition for quantifier elimination, Journal, of Symbolic Computation 12 (1991), 299-328.
-
(1991)
Journal, of Symbolic Computation
, vol.12
, pp. 299-328
-
-
Collins, G.E.1
Hong, H.2
-
11
-
-
0017517624
-
Certification of programs for secure information flow
-
D.E. Denning and P.J. Denning, Certification of programs for secure information flow, Commun. ACM 20(7) (1977), 504-513.
-
(1977)
Commun. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
12
-
-
84988393004
-
Classification of security properties (Part I: Information flow)
-
Proc. of Foundations of Security Analysis and Design FOSAD'Ol, R. Focardi and R. Gorrieri, eds, of, Springer
-
R. Focardi and R. Gorrieri, Classification of security properties (Part I: Information flow), in: Proc. of Foundations of Security Analysis and Design (FOSAD'Ol), R. Focardi and R. Gorrieri, eds, volume 2171 of LNCS, Springer, 2001, pp. 331-396.
-
(2001)
LNCS
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
15
-
-
85025500424
-
Complexity of deciding tarski algebra
-
D. Grigoriev, Complexity of deciding tarski algebra, Journal of Symbolic Computation 5 (1988), 65-108.
-
(1988)
Journal of Symbolic Computation
, vol.5
, pp. 65-108
-
-
Grigoriev, D.1
-
18
-
-
84944059120
-
Unwinding possibilistic security properties
-
Proc. of the European Symposium on Research in Computer Security ESoRiCS '00, of, Springer
-
H. Mantel, Unwinding possibilistic security properties, in: Proc. of the European Symposium on Research in Computer Security (ESoRiCS '00), volume 2895 of LNCS, Springer, 2000, pp. 238-254.
-
(2000)
LNCS
, vol.2895
, pp. 238-254
-
-
Mantel, H.1
-
19
-
-
0000528087
-
Enumerable sets are diophantine
-
Y.V. Matiyasevich, Enumerable sets are diophantine, Soviet Mathematics Doklady 11(2) (1970), 354-358.
-
(1970)
Soviet Mathematics Doklady
, vol.11
, Issue.2
, pp. 354-358
-
-
Matiyasevich, Y.V.1
-
23
-
-
4944222278
-
Enforcing robust declassification
-
IEEE Computer Society
-
A.C. Myers, A. Sabelfeld and S. Zdancewic, Enforcing robust declassification, in: Proc. of the 17th IEEE Computer Security Foundations Workshop (CSFW'04), IEEE Computer Society, 2004, pp. 172-186.
-
(2004)
Proc. of the 17th IEEE Computer Security Foundations Workshop (CSFW'04)
, pp. 172-186
-
-
Myers, A.C.1
Sabelfeld, A.2
Zdancewic, S.3
-
24
-
-
35048854255
-
Information flow control revisited: Noninfluence = noninterference + nonleakage
-
Proc. of the 9th European Symposium on Research in Computer Security ESORICS'04, of, Springer
-
D. von Oheimb, Information flow control revisited: noninfluence = noninterference + nonleakage, in: Proc. of the 9th European Symposium on Research in Computer Security (ESORICS'04), volume 3193 of LNCS, Springer, 2004, pp. 225-243.
-
(2004)
LNCS
, vol.3193
, pp. 225-243
-
-
von Oheimb, D.1
-
25
-
-
0001572510
-
On the computational complexity and geometry of the first-order theory of the reals, parts I-III
-
J. Renegar, On the computational complexity and geometry of the first-order theory of the reals, parts I-III, Journal of Symbolic Computation 13 (1992), 255-352.
-
(1992)
Journal of Symbolic Computation
, vol.13
, pp. 255-352
-
-
Renegar, J.1
-
27
-
-
84958755151
-
Static confidentiality enforcement for distributed programs
-
Proc. of Int. Static Analysis Symposium SAS'02, M.V. Hermenegildo and G. Puebla, eds, of, Springer
-
A. Sabelfeld and H. Mantel, Static confidentiality enforcement for distributed programs, in: Proc. of Int. Static Analysis Symposium (SAS'02), M.V. Hermenegildo and G. Puebla, eds, volume 2477 of LNCS, Springer, 2002, pp. 376-394.
-
(2002)
LNCS
, vol.2477
, pp. 376-394
-
-
Sabelfeld, A.1
Mantel, H.2
-
29
-
-
35048828759
-
A model for delimited information release
-
Proceedings of the International Symposium on Software Security, Theories and Systems ISSS 2003, of, Springer
-
A. Sabelfeld and A.C. Myers, A model for delimited information release, in: Proceedings of the International Symposium on Software Security, Theories and Systems (ISSS 2003), volume 3233 of LNCS, Springer, 2003, pp. 174-191.
-
(2003)
LNCS
, vol.3233
, pp. 174-191
-
-
Sabelfeld, A.1
Myers, A.C.2
-
31
-
-
0035276729
-
A per model of secure information flow in sequential programs
-
A. Sabelfeld and D. Sands, A per model of secure information flow in sequential programs, Higher-Older and Symbolic Computation 14(1) (2001), 59-91.
-
(2001)
Higher-Older and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
37
-
-
84956989228
-
A type-based approach to program security
-
D.M. Volpano and G. Smith, A type-based approach to program security, in: TAPSOFT, 1997, pp. 607-621.
-
(1997)
TAPSOFT
, pp. 607-621
-
-
Volpano, D.M.1
Smith, G.2
-
38
-
-
0033330060
-
Probabilistic noninterference in a concurrent language
-
D.M. Volpano and G. Smith, Probabilistic noninterference in a concurrent language, Journal of Computer Security 7(2-3) (1999), 231-253.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 231-253
-
-
Volpano, D.M.1
Smith, G.2
|