-
3
-
-
84957037045
-
Computational probabilistic noninterference
-
M. Backes and B. Pfitzmann. Computational probabilistic noninterference. In Proceeding 7th ESORICS, pages 1-23, 2002.
-
(2002)
Proceeding 7th ESORICS
, pp. 1-23
-
-
Backes, M.1
Pfitzmann, B.2
-
8
-
-
0017517624
-
Certification of programs for secure information flow
-
D. Denning and P. Denning. Certification of programs for secure information flow. Commun. ACM, 20(7):504-513, 1977.
-
(1977)
Commun. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.1
Denning, P.2
-
9
-
-
84948746951
-
Approximate non-interference
-
Cape Breton, Nova Scotia, Canada, June
-
A. Di Pierro, C. Hankin, and H. Wiklicky. Approximate non-interference. In Proceedings 15th IEEE Computer Security Foundations Workshop, pages 1-17, Cape Breton, Nova Scotia, Canada, June 2002.
-
(2002)
Proceedings 15th IEEE Computer Security Foundations Workshop
, pp. 1-17
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
13
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
P. Laud. Semantics and program analysis of computationally secure information flow. In Proceedings 10th ESOP (European Symposium on Programming, pages 77-91, 2001.
-
(2001)
Proceedings 10th ESOP (European Symposium on Programming
, pp. 77-91
-
-
Laud, P.1
-
16
-
-
26844509701
-
A type system for computationally secure information flow
-
Proceedings of the 15th International Symposium on Fundamentals of Computational Theory, of, Lübeck, Germany
-
P. Laud and V. Vene. A type system for computationally secure information flow. In Proceedings of the 15th International Symposium on Fundamentals of Computational Theory, volume 3623 of Lecture Notes in Computer Science, pages 365-377, Lübeck, Germany, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3623
, pp. 365-377
-
-
Laud, P.1
Vene, V.2
-
18
-
-
0005260169
-
-
Cornell University, Available at
-
A. C. Myers, S. Chong, N. Nystrom, L. Zheng, and S. Zdancewic. Jif: Java + information flow. Cornell University, 2004. Available at http://www.cs.cornell.edu/jif/.
-
(2004)
Jif: Java + information flow
-
-
Myers, A.C.1
Chong, S.2
Nystrom, N.3
Zheng, L.4
Zdancewic, S.5
-
21
-
-
0034835461
-
A new type system for secure information flow
-
Cape Breton, Nova Scotia, Canada, June
-
G. Smith. A new type system for secure information flow. In Proceedings 14th IEEE Computer Security Foundations Workshop, pages 115-125, Cape Breton, Nova Scotia, Canada, June 2001.
-
(2001)
Proceedings 14th IEEE Computer Security Foundations Workshop
, pp. 115-125
-
-
Smith, G.1
-
22
-
-
18544362925
-
Probabilistic noninterference through weak probabilistic bisimulation
-
Pacific Grove, California, June
-
G. Smith. Probabilistic noninterference through weak probabilistic bisimulation. In Proceedings 16th IEEE Computer Security Foundations Workshop, pages 3-13, Pacific Grove, California, June 2003.
-
(2003)
Proceedings 16th IEEE Computer Security Foundations Workshop
, pp. 3-13
-
-
Smith, G.1
-
25
-
-
84942255620
-
A computational analysis of the Needham-Schroeder-(Lowe) protocol
-
Pacific Grove, California, June
-
B. Warinschi. A computational analysis of the Needham-Schroeder-(Lowe) protocol. In Proceedings 16th IEEE Computer Security Foundations Workshop, pages 248-262, Pacific Grove, California, June 2003.
-
(2003)
Proceedings 16th IEEE Computer Security Foundations Workshop
, pp. 248-262
-
-
Warinschi, B.1
|