-
2
-
-
0003400251
-
Secure Computer Systems: Unified Exposition and Multics Interpretation
-
[BL76] MITRE
-
[BL76] D. E. Bell and L. LaPadula. Secure Computer Systems: Unified Exposition and Multics Interpretation. Technical Report MTR-2997, MITRE, 1976.
-
(1976)
Technical Report MTR-2997
-
-
Bell, D.E.1
Lapadula, L.2
-
3
-
-
84957037045
-
Computational Probabilistic Non-interference
-
[BP02] LNCS 2502
-
[BP02] M. Backes and B. Pfitzmann. Computational Probabilistic Non-interference. In Proceedings of ESORICS, LNCS 2502, pages 1-23, 2002.
-
(2002)
Proceedings of ESORICS
, pp. 1-23
-
-
Backes, M.1
Pfitzmann, B.2
-
4
-
-
4944242009
-
Modelling Downgrading in Information Flow Security
-
[BPR04] to appear
-
[BPR04] A. Bossi, C. Piazza, and S. Rossi. Modelling Downgrading in Information Flow Security. In Proc. of IEEE CSFW, 2004. to appear.
-
(2004)
Proc. of IEEE CSFW
-
-
Bossi, A.1
Piazza, C.2
Rossi, S.3
-
6
-
-
0001760770
-
Information Transmission in Sequential Programs
-
[Coh78] Academic Press
-
[Coh78] E. S. Cohen. Information Transmission in Sequential Programs. In Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
7
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
[Den76]
-
[Den76] D. E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
9
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
[Koc96] Neal Koblitz, editor, LNCS, Springer-Verlag
-
[Koc96] P. C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Neal Koblitz, editor, Advances in Cryptology -CRYPTO'96, volume 1109 of LNCS, pages 104-113. Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology -CRYPTO'96
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
10
-
-
35248840989
-
Handling Encryption in an Analysis for Secure Information Flow
-
[Lau03] LNCS 2618, Springer-Verlag
-
[Lau03] P. Laud. Handling Encryption in an Analysis for Secure Information Flow. In Proceedings of ESOP, LNCS 2618, pages 159-173. Springer-Verlag, 2003.
-
(2003)
Proceedings of ESOP
, pp. 159-173
-
-
Laud, P.1
-
11
-
-
84948775168
-
Quantifying Information Flow
-
[Low02]
-
[Low02] G. Lowe. Quantifying Information Flow. In Proceedings of IEEE CSFW, pages 18-31, 2002.
-
(2002)
Proceedings of IEEE CSFW
, pp. 18-31
-
-
Lowe, G.1
-
12
-
-
84881123660
-
Information Flow Control and Applications - Bridging a Gap
-
[Man01] LNCS 2021
-
[Man01] H. Mantel. Information Flow Control and Applications - Bridging a Gap. In Proceedings of Formal Methods Europe, LNCS 2021, pages 153-172, 2001.
-
(2001)
Proceedings of Formal Methods Europe
, pp. 153-172
-
-
Mantel, H.1
-
13
-
-
1442267753
-
A Probabilistic Polynomial-Time Calculus for Analysis of Cryptographic Protocols (Preliminary report)
-
[MRST01] ENTCS
-
[MRST01] J. Mitchell, A. Ramanathan, A. Scedrov, and V. Teague. A Probabilistic Polynomial-Time Calculus for Analysis of Cryptographic Protocols (Preliminary report). In Proc. of the Conf. on the Math. Foundations of Programming Semantics, volume 45 of ENTCS, 2001.
-
(2001)
Proc. of the Conf. on the Math. Foundations of Programming Semantics
, vol.45
-
-
Mitchell, J.1
Ramanathan, A.2
Scedrov, A.3
Teague, V.4
-
16
-
-
0029228214
-
Absorbing Covers and Intransitive Non-Interference
-
[Pin95] Oakland, CA, USA
-
[Pin95] S. Pinsky. Absorbing Covers and Intransitive Non-Interference. In Proceedings of the IEEE Symposium on Security and Privacy, pages 102-113, Oakland, CA, USA, 1995.
-
(1995)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 102-113
-
-
Pinsky, S.1
-
18
-
-
0003502331
-
Noninterference, Transitivity, and Channel-Control Security Policies
-
[Rus92] SRI International
-
[Rus92] J. M. Rushby. Noninterference, Transitivity, and Channel-Control Security Policies. Technical Report CSL-92-02, SRI International, 1992.
-
(1992)
Technical Report CSL-92-02
-
-
Rushby, J.M.1
-
21
-
-
0033700286
-
Probabilistic Noninterference for Multi-threaded Programs
-
[SS00]
-
[SS00] A. Sabelfeld and D. Sands. Probabilistic Noninterference for Multi-threaded Programs. In Proceedings of IEEE CSFW, pages 200-214, 2000.
-
(2000)
Proceedings of IEEE CSFW
, pp. 200-214
-
-
Sabelfeld, A.1
Sands, D.2
-
22
-
-
0035276729
-
A Per Model of Secure Information Flow in Sequential Programs
-
[SS01]
-
[SS01] A. Sabelfeld and D. Sands. A Per Model of Secure Information Flow in Sequential Programs. HOSC, 14(1):59-91, 2001.
-
(2001)
HOSC
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
23
-
-
0030673701
-
Eliminating Covert Flows with Minimum Typings
-
[VS97]
-
[VS97] D. Volpano and G. Smith. Eliminating Covert Flows with Minimum Typings. In Proceedings of IEEE CSFW, pages 156-168, 1997.
-
(1997)
Proceedings of IEEE CSFW
, pp. 156-168
-
-
Volpano, D.1
Smith, G.2
-
24
-
-
0033705210
-
Verifying Secrets and Relative Secrecy
-
[VS00]
-
[VS00] D. M. Volpano and G. Smith. Verifying Secrets and Relative Secrecy. In Proceedings of POPL, pages 268-276, 2000.
-
(2000)
Proceedings of POPL
, pp. 268-276
-
-
Volpano, D.M.1
Smith, G.2
|