-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
September
-
M. Abadi. Secrecy by typing in security protocols. J. ACM, 46(5):749-786, September 1999.
-
(1999)
J. ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0032681509
-
A core calculus of dependency
-
January
-
M. Abadi, A. Banerjee, N. Heintze, and J. Riecke. A core calculus of dependency. In Proc. ACM Symp. on Principles of Programming Languages, pages 147-160, January 1999.
-
(1999)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.4
-
3
-
-
0003092378
-
A calculus for cryptographic protocols: The Spi calculus
-
January
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The Spi calculus. Information and Computation, 148(1):1-70, January 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
8
-
-
0001760770
-
Information transmission in sequential programs
-
R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Academic Press
-
E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
9
-
-
0033718531
-
Confidentiality for mobile code: The case of a simple payment protocol
-
July
-
M. Dam and P. Giambiagi. Confidentiality for mobile code: The case of a simple payment protocol. In Proc. IEEE Computer Security Foundations Workshop, pages 233-244, July 2000.
-
(2000)
Proc. IEEE Computer Security Foundations Workshop
, pp. 233-244
-
-
Dam, M.1
Giambiagi, P.2
-
11
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
14
-
-
1442287656
-
Abstract non-interference: Parameterizing noninterference by abstract interpretation
-
January
-
R. Giacobazzi and I. Mastroeni. Abstract non-interference: Parameterizing noninterference by abstract interpretation. In Proc. ACM Symp. on Principles of Programming Languages, pages 186-197, January 2004.
-
(2004)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 186-197
-
-
Giacobazzi, R.1
Mastroeni, I.2
-
15
-
-
35248815514
-
On the secure implementation of security protocols
-
LNCS, Springer-Verlag, April
-
P. Giambiagi and M.Dam. On the secure implementation of security protocols. In Proc. European Symp. on Programming, volume 2618 of LNCS, pages 144-158. Springer-Verlag, April 2003.
-
(2003)
Proc. European Symp. on Programming
, vol.2618
, pp. 144-158
-
-
Giambiagi, P.1
Dam, M.2
-
20
-
-
0033751850
-
A semantic approach to secure information flow
-
R. Joshi and K. R. M. Leino. A semantic approach to secure information flow. Science of Computer Programming, 37(1-3):113-138, 2000.
-
(2000)
Science of Computer Programming
, vol.37
, Issue.1-3
, pp. 113-138
-
-
Joshi, R.1
Leino, K.R.M.2
-
21
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
Proc. European Symp. on Programming, Springer-Verlag, April
-
P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. European Symp. on Programming, volume 2028 of LNCS, pages 77-91. Springer-Verlag, April 2001.
-
(2001)
LNCS
, vol.2028
-
-
Laud, P.1
-
22
-
-
35248840989
-
Handling encryption in an analysis for secure information flow
-
Proc. European Symp. on Programming, SpringerVerlag, April
-
P. Laud. Handling encryption in an analysis for secure information flow. In Proc. European Symp. on Programming, volume 2618 of LNCS, pages 159-173. SpringerVerlag, April 2003.
-
(2003)
LNCS
, vol.2618
, pp. 159-173
-
-
Laud, P.1
-
24
-
-
84881123660
-
Information flow control and applications-Bridging a gap
-
Proc. Formal Methods Europe, Springer-Verlag, March
-
H. Mantel. Information flow control and applications-Bridging a gap. In Proc. Formal Methods Europe, volume 2021 of LNCS, pages 153-172. Springer-Verlag, March 2001.
-
(2001)
LNCS
, vol.2021
, pp. 153-172
-
-
Mantel, H.1
-
26
-
-
0025211594
-
The specification and modeling of computer security
-
January
-
J. McLean. The specification and modeling of computer security. Computer, 23(1):9-16, January 1990.
-
(1990)
Computer
, vol.23
, Issue.1
, pp. 9-16
-
-
McLean, J.1
-
29
-
-
0031682833
-
Complete, safe information flow with decentralized labels
-
May
-
A. C. Myers and B. Liskov. Complete, safe information flow with decentralized labels. In Proc. IEEE Symp. on Security and Privacy, pages 186-197, May 1998.
-
(1998)
Proc. IEEE Symp. on Security and Privacy
, pp. 186-197
-
-
Myers, A.C.1
Liskov, B.2
-
31
-
-
0005260169
-
-
Located at http://www.cs.cornell.edu/jif, July
-
A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001-2003.
-
(2001)
Jif: Java Information Flow. Software Release.
-
-
Myers, A.C.1
Zheng, L.2
Zdancewic, S.3
Chong, S.4
Nystrom, N.5
-
32
-
-
0029228214
-
Absorbing covers and intransitive non-interference
-
May
-
S. Pinsky. Absorbing covers and intransitive non-interference. In Proc. IEEE Symp. on Security and Privacy, pages 102-113, May 1995.
-
(1995)
Proc. IEEE Symp. on Security and Privacy
, pp. 102-113
-
-
Pinsky, S.1
-
36
-
-
0003502331
-
Noninterference, transitivity, and channel-control security policies
-
SRI International
-
J. M. Rushby. Noninterference, transitivity, and channel-control security policies. Technical Report CSL-92-02, SRI International, 1992.
-
(1992)
Technical Report CSL-92-02
-
-
Rushby, J.M.1
-
39
-
-
0035276729
-
A per model of secure information flow in sequential programs
-
March
-
A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher Order and Symbolic Computation, 14(1):59-91, March 2001.
-
(2001)
Higher Order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
40
-
-
84976845043
-
End-to-end arguments in system design
-
November
-
J. H. Saltzer, D. P. Reed, and D. D. Clark. End-to-end arguments in system design. ACM Transactions on Computer Systems, 2(4):277-288, November 1984.
-
(1984)
ACM Transactions on Computer Systems
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.H.1
Reed, D.P.2
Clark, D.D.3
-
45
-
-
0033330060
-
Probabilistic noninterference in a concurrent language
-
November
-
D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. J. Computer Security, 7(2-3):231-253, November 1999.
-
(1999)
J. Computer Security
, vol.7
, Issue.2-3
, pp. 231-253
-
-
Volpano, D.1
Smith, G.2
-
47
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3): 167-187, 1996.
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
51
-
-
84945262623
-
Secure information flow and CPS
-
Proc. European Symp. on Programming, Springer-Verlag, April
-
S. Zdancewic and A. C. Myers. Secure information flow and CPS. In Proc. European Symp. on Programming, volume 2028 of LNCS, pages 46-61. Springer-Verlag, April 2001.
-
(2001)
LNCS
, vol.2028
, pp. 46-61
-
-
Zdancewic, S.1
Myers, A.C.2
|