-
1
-
-
34247276117
-
Access control in a core calculus of dependency
-
Portland, Oregon, USA, September
-
M. Abadi. Access control in a core calculus of dependency. In ICFP '06: Proceedings of the eleventh ACM SIGPLAN international conference on Functional Programming, pages 263-273, Portland, Oregon, USA, September 2006.
-
(2006)
ICFP '06: Proceedings of the eleventh ACM SIGPLAN international conference on Functional Programming
, pp. 263-273
-
-
Abadi, M.1
-
2
-
-
0000828586
-
Dynamic typing in polymorphic languages
-
January
-
M. Abadi, L. Cardelli, B. Pierce, and D. Rémy. Dynamic typing in polymorphic languages. Journal of Functional Programming, 5(1): 111-130, January 1995.
-
(1995)
Journal of Functional Programming
, vol.5
, Issue.1
, pp. 111-130
-
-
Abadi, M.1
Cardelli, L.2
Pierce, B.3
Rémy, D.4
-
3
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2): 103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
4
-
-
34548773746
-
Cryptographically masked information flows
-
Proceedings of the International Static Analysis Symposium, Seoul, Korea, August
-
A. Askarov, D. Hedin, and A. Sabelfeld. Cryptographically masked information flows. In Proceedings of the International Static Analysis Symposium, LNCS, Seoul, Korea, August 2006.
-
(2006)
LNCS
-
-
Askarov, A.1
Hedin, D.2
Sabelfeld, A.3
-
7
-
-
1442292329
-
A composable cryptographic library with nested operations
-
Washington D.C, USA, ACM Press
-
M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 220-230, Washington D.C., USA, 2003. ACM Press.
-
(2003)
CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
8
-
-
0003400251
-
Secure computer system: Unified exposition and Multics interpretation
-
Technical Report ESD-TR-75-306, MITRE Corp. MTR-2997, Bedford, MA, Available as NTIS AD-A023 588
-
D. E. Bell and L. J. LaPadula. Secure computer system: Unified exposition and Multics interpretation. Technical Report ESD-TR-75-306, MITRE Corp. MTR-2997, Bedford, MA, 1975. Available as NTIS AD-A023 588.
-
(1975)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
9
-
-
34250161521
-
Industrial experience with spark
-
R. Chapman. Industrial experience with spark. Ada Lett., XX(4):64-68, 2000.
-
(2000)
Ada Lett
, vol.20
, Issue.4
, pp. 64-68
-
-
Chapman, R.1
-
10
-
-
33947615814
-
Decentralized robustness
-
Los Alamitos, CA, USA, July
-
S. Chong and A. C. Myers. Decentralized robustness. In Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW'06), pages 242-253, Los Alamitos, CA, USA, July 2006.
-
(2006)
Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW'06)
, pp. 242-253
-
-
Chong, S.1
Myers, A.C.2
-
12
-
-
84942244044
-
Type based distributed access control
-
Asilomar, Ca, USA, July
-
T. Chothia, D. Duggan, and J. Vitek. Type based distributed access control. In Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW'03), Asilomar, Ca., USA, July 2003.
-
(2003)
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW'03)
-
-
Chothia, T.1
Duggan, D.2
Vitek, J.3
-
13
-
-
0041684496
-
-
PhD thesis, Purdue University, W. Lafayette, Indiana, USA, May
-
D. E. Denning. Secure Information Flow in Computer Systems. PhD thesis, Purdue University, W. Lafayette, Indiana, USA, May 1975.
-
(1975)
Secure Information Flow in Computer Systems
-
-
Denning, D.E.1
-
14
-
-
0017517624
-
Certification of Programs for Secure Information Flow
-
July
-
D. E. Denning and P. J. Denning. Certification of Programs for Secure Information Flow. Comm. of the ACM, 20(7):504-513, July 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
15
-
-
85023809951
-
Threshold cryptosystems
-
New York, NY, USA, Springer-Verlag New York, Inc
-
Y. G. Desmedt and Y. Frankel. Threshold cryptosystems. In CRYPTO '89: Proceedings on Advances in cryptology, pages 307-315, New York, NY, USA, 1989. Springer-Verlag New York, Inc.
-
(1989)
CRYPTO '89: Proceedings on Advances in cryptology
, pp. 307-315
-
-
Desmedt, Y.G.1
Frankel, Y.2
-
17
-
-
84948736825
-
Cryptographic types
-
Washington, DC, USA, IEEE Computer Society
-
D. Duggan. Cryptographic types. In CSFW '02: Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW'02), page 238, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
CSFW '02: Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW'02)
, pp. 238
-
-
Duggan, D.1
-
19
-
-
0031701347
-
The SLam calculus: Programming with secrecy and integrity
-
New York, NY, USA, ACM Press
-
N. Heintze and J. G. Riecke. The SLam calculus: programming with secrecy and integrity. In POPL '98: Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 365-377, New York, NY, USA, 1998. ACM Press.
-
(1998)
POPL '98: Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.G.2
-
20
-
-
39049162501
-
Understanding practical application development in security-typed languages
-
Miami, Fl, December
-
B. Hicks, K. Ahmadizadeh, and P. McDaniel. Understanding practical application development in security-typed languages. In 22st Annual Computer Security Applications Conference (ACSAC), Miami, Fl, December 2006.
-
(2006)
22st Annual Computer Security Applications Conference (ACSAC)
-
-
Hicks, B.1
Ahmadizadeh, K.2
McDaniel, P.3
-
21
-
-
26844509701
-
A type system for computationally secure information flow
-
Lübeck, Germany
-
P. Laud and V. Vene. A type system for computationally secure information flow. In Proceedings of the 15th International Symposium on Fundamentals of Computational Theory, volume 3623, pages 365-377, Lübeck, Germany, 2005.
-
(2005)
Proceedings of the 15th International Symposium on Fundamentals of Computational Theory
, vol.3623
, pp. 365-377
-
-
Laud, P.1
Vene, V.2
-
30
-
-
34547244658
-
Secure information flow with random assignment and encryption
-
Alexandria, Virgina, USA, November
-
G. Smith and R. Alpizar. Secure information flow with random assignment and encryption. In Proceedings of The 4th ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FSME'06), pages 33-43, Alexandria, Virgina, USA, November 2006.
-
(2006)
Proceedings of The 4th ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FSME'06)
, pp. 33-43
-
-
Smith, G.1
Alpizar, R.2
-
33
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|