-
2
-
-
84879520825
-
Noninterference for concurrent programs
-
Proc. ICALP'01, of, Springer-Verlag, July
-
G. Boudol and I. Castellani. Noninterference for concurrent programs. In Proc. ICALP'01, volume 2076 of LNCS, pages 382-395. Springer-Verlag, July 2001.
-
(2001)
LNCS
, vol.2076
, pp. 382-395
-
-
Boudol, G.1
Castellani, I.2
-
3
-
-
0037014243
-
Non-interference for concurrent programs and thread systems
-
June
-
G. Boudol and I. Castellani. Non-interference for concurrent programs and thread systems. Theoretical Computer Science, 281(1):109-130, June 2002.
-
(2002)
Theoretical Computer Science
, vol.281
, Issue.1
, pp. 109-130
-
-
Boudol, G.1
Castellani, I.2
-
4
-
-
84988393004
-
Classification of security properties (part I: Information flow)
-
R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, of, Springer-Verlag
-
R. Focardi and R. Gorrieri. Classification of security properties (part I: Information flow). In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 331-396. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
5
-
-
31844442209
-
Composable memory transactions
-
June
-
T. Harris, M. Herlihy, S. Marlow, and S. P. Jones. Composable memory transactions. In Proc. ACM Symp. on Principles and Practice of Parallel Programming, to appear, June 2005.
-
(2005)
Proc. ACM Symp. on Principles and Practice of Parallel Programming, to appear
-
-
Harris, T.1
Herlihy, M.2
Marlow, S.3
Jones, S.P.4
-
6
-
-
84947269249
-
Secure information flow as typed process behaviour
-
Proc. European Symp. on Programming, of, Springer-Verlag
-
K. Honda, V. Vasconcelos, and N. Yoshida. Secure information flow as typed process behaviour. In Proc. European Symp. on Programming, volume 1782 of LNCS, pages 180-199. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1782
, pp. 180-199
-
-
Honda, K.1
Vasconcelos, V.2
Yoshida, N.3
-
8
-
-
0033751744
-
Generalising monads to arrows
-
J. Hughes. Generalising monads to arrows. Science of Computer Programming, 37(1-3):67-111, 2000.
-
(2000)
Science of Computer Programming
, vol.37
, Issue.1-3
, pp. 67-111
-
-
Hughes, J.1
-
10
-
-
33646048553
-
Pers generalise projections for strictness analysis (extended abstract)
-
Workshops in Computing, Ullapool, Springer-Verlag
-
S. Hunt. Pers generalise projections for strictness analysis (extended abstract). In Proc. 1990 Glasgow Workshop on Functional Programming, Workshops in Computing, Ullapool, 1991. Springer-Verlag.
-
(1991)
Proc. 1990 Glasgow Workshop on Functional Programming
-
-
Hunt, S.1
-
11
-
-
33745678531
-
Eliminating implicit information leaks by transformational typing and unification
-
FAST'05, of, Springer-Verlag, July
-
B. Köpf and H. Mantel. Eliminating implicit information leaks by transformational typing and unification. In FAST'05, volume 3866 of LNCS. Springer-Verlag, July 2006.
-
(2006)
LNCS
, vol.3866
-
-
Köpf, B.1
Mantel, H.2
-
14
-
-
12844283698
-
Jif: Java information flow
-
release, July
-
A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow. Software release. http://www.cs.cornell.edu/jif, July 2001-2006.
-
(2001)
Software
-
-
Myers, A.C.1
Zheng, L.2
Zdancewic, S.3
Chong, S.4
Nystrom, N.5
-
15
-
-
0003818126
-
-
Springer-Verlag New York, Inc, Secaucus, NJ, USA
-
F. Nielson, H. R. Nielson, and C. Hankin. Principles of Program Analysis. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 1999.
-
(1999)
Principles of Program Analysis
-
-
Nielson, F.1
Nielson, H.R.2
Hankin, C.3
-
17
-
-
84948737028
-
A simple view of type-secure information flow in the pi-calculus
-
June
-
F. Pottier. A simple view of type-secure information flow in the pi-calculus. In Proc. IEEE Computer Security Foundations Workshop, pages 320-330, June 2002.
-
(2002)
Proc. IEEE Computer Security Foundations Workshop
, pp. 320-330
-
-
Pottier, F.1
-
19
-
-
78049394407
-
Closing internal timing channels by transformation
-
Proc. Annual Asian Computing Science Conference, Dec
-
A. Russo, J. Hughes, D. Naumann, and A. Sabelfeld. Closing internal timing channels by transformation. In Proc. Annual Asian Computing Science Conference, LNCS, Dec. 2006.
-
(2006)
LNCS
-
-
Russo, A.1
Hughes, J.2
Naumann, D.3
Sabelfeld, A.4
-
21
-
-
33947697220
-
Security for multithreaded programs under cooperative scheduling
-
Proc. PST06, Springer-Verlag, June
-
A. Russo and A. Sabelfeld. Security for multithreaded programs under cooperative scheduling. In Proc. PST06, LNCS. Springer-Verlag, June 2006.
-
(2006)
LNCS
-
-
Russo, A.1
Sabelfeld, A.2
-
22
-
-
84949243805
-
Mathematical models of computer security - tutorial lectures
-
R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, of, Springer-Verlag
-
P. Ryan. Mathematical models of computer security - tutorial lectures. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 1-62. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2171
, pp. 1-62
-
-
Ryan, P.1
-
23
-
-
84885715358
-
The impact of synchronisation on secure information flow in concurrent programs
-
Proc. Andrei Ershov International Conference on Perspectives of System Informatics, of, Springer-Verlag, July
-
A. Sabelfeld. The impact of synchronisation on secure information flow in concurrent programs. In Proc. Andrei Ershov International Conference on Perspectives of System Informatics, volume 2244 of LNCS, pages 225-239. Springer-Verlag, July 2001.
-
(2001)
LNCS
, vol.2244
, pp. 225-239
-
-
Sabelfeld, A.1
-
24
-
-
84958755151
-
Static confidentiality enforcement for distributed programs
-
Proc. Symp. on Static Analysis, of, Springer-Verlag, Sept
-
A. Sabelfeld and H. Mantel. Static confidentiality enforcement for distributed programs. In Proc. Symp. on Static Analysis, volume 2477 of LNCS, pages 376-394. Springer-Verlag, Sept. 2002.
-
(2002)
LNCS
, vol.2477
, pp. 376-394
-
-
Sabelfeld, A.1
Mantel, H.2
-
26
-
-
84957869855
-
A per model of secure information flow in sequential programs
-
Proc. European Symp. on Programming, of, Springer-Verlag, Mar
-
A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. In Proc. European Symp. on Programming, volume 1576 of LNCS, pages 40-58. Springer-Verlag, Mar. 1999.
-
(1999)
LNCS
, vol.1576
, pp. 40-58
-
-
Sabelfeld, A.1
Sands, D.2
-
29
-
-
3543056029
-
Flow caml in a nutshell
-
Graham Hutton, editor, workshop, Mar
-
V. Simonet. Flow caml in a nutshell. In Graham Hutton, editor, Proceedings of the first APPSEM-II workshop, pages 152-165, Mar. 2003.
-
(2003)
Proceedings of the first APPSEM-II
, pp. 152-165
-
-
Simonet, V.1
-
31
-
-
18544362925
-
Probabilistic noninterference through weak probabilistic bisimulation
-
G. Smith. Probabilistic noninterference through weak probabilistic bisimulation. In Proc. IEEE Computer Security Foundations Workshop, pages 3-13, 2003.
-
(2003)
Proc. IEEE Computer Security Foundations Workshop
, pp. 3-13
-
-
Smith, G.1
-
33
-
-
35048891366
-
The glasgow haskell compiler
-
The GHC Team, release
-
The GHC Team. The glasgow haskell compiler. Software release. http://haskell.org/ghc/.
-
Software
-
-
-
34
-
-
35048873572
-
A library for secure multi-threaded information flow in haskell
-
release. Available at
-
T. C. Tsai and A. Russo. A library for secure multi-threaded information flow in haskell. Software release. Available at http://www.cs.chalmers.se/ ~russo/tsai.htm.
-
Software
-
-
Tsai, T.C.1
Russo, A.2
-
35
-
-
0033330060
-
Probabilistic noninterference in a concurrent language
-
Nov
-
D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. J. Computer Security, 7(2-3):231-253, Nov. 1999.
-
(1999)
J. Computer Security
, vol.7
, Issue.2-3
, pp. 231-253
-
-
Volpano, D.1
Smith, G.2
-
36
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3):167-187, 1996.
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|