-
1
-
-
0032681509
-
A core calculus of dependency
-
Martín Abadi, Anindya Banerjee, Nevin Heintze, and Jon G. Riecke. A core calculus of dependency. In ACM Symposium on Principles of Programming Languages (POPL), pages 147-160, 1999.
-
(1999)
ACM Symposium on Principles of Programming Languages (POPL)
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
2
-
-
35048823361
-
Information flow analysis in logical form
-
Kansas State University, April
-
Torben Amtoft and Anindya Banerjee. Information flow analysis in logical form. Technical Report CIS TR 2004-3, Kansas State University, April 2004.
-
(2004)
Technical Report CIS TR 2004-3
-
-
Amtoft, T.1
Banerjee, A.2
-
4
-
-
84948752619
-
Secure information flow and pointer confinement in a Java-like language
-
IEEE Computer Society Press
-
Anindya Banerjee and David A. Naumann. Secure information flow and pointer confinement in a Java-like language. In IEEE Computer Security Foundations Workshop (CSFW), pages 253-270. IEEE Computer Society Press, 2002.
-
(2002)
IEEE Computer Security Foundations Workshop (CSFW)
, pp. 253-270
-
-
Banerjee, A.1
Naumann, D.A.2
-
6
-
-
0036555709
-
Information flow for Algol-like languages
-
David Clark, Chris Hankin, and Sebastian Hunt. Information flow for Algol-like languages. Computer Languages, 28(1):3-28, 2002.
-
(2002)
Computer Languages
, vol.28
, Issue.1
, pp. 3-28
-
-
Clark, D.1
Hankin, C.2
Hunt, S.3
-
7
-
-
0001760770
-
Information transmission in sequential programs
-
Richard A. DeMillo, David P. Dobkin, Anita K. Jones, and Richard J. Lipton, editors, Academic Press
-
Ellis S. Cohen. Information transmission in sequential programs. In Richard A. DeMillo, David P. Dobkin, Anita K. Jones, and Richard J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
8
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
ACM Press, New York, NY
-
Patrick Cousot and Radhia Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In ACM Symposium on Principles of Programming Languages (POPL), pages 238-252. ACM Press, New York, NY, 1977.
-
(1977)
ACM Symposium on Principles of Programming Languages (POPL)
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
9
-
-
84878892024
-
Automatic synthesis of optimal invariant assertions: Mathematical foundations
-
ACM Press, August
-
Patrick Cousot and Radhia Cousot. Automatic synthesis of optimal invariant assertions: mathematical foundations. In Proceedings of the ACM Symposium on Artificial Intelligence and Programming Languages, SIGPLAN Notices, volume 12, pages 1-12. ACM Press, August 1977.
-
(1977)
Proceedings of the ACM Symposium on Artificial Intelligence and Programming Languages, SIGPLAN Notices
, vol.12
, pp. 1-12
-
-
Cousot, P.1
Cousot, R.2
-
10
-
-
14844353524
-
A theorem proving approach to analysis of secure information flow
-
Department of Computing Science, Chalmers University of Technology and Goteborg University, 2004. A fuller version of a paper appearing in Workshop on Issues in the Theory of Security
-
Ádám Darvas, Reiner Hähnle, and Dave Sands. A theorem proving approach to analysis of secure information flow. Technical Report 2004-01, Department of Computing Science, Chalmers University of Technology and Goteborg University, 2004. A fuller version of a paper appearing in Workshop on Issues in the Theory of Security, 2003.
-
(2003)
Technical Report 2004-01
-
-
Darvas, Á.1
Hähnle, R.2
Sands, D.3
-
11
-
-
0017517624
-
Certification of programs for secure information flow
-
Dorothy Denning and Peter Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.1
Denning, P.2
-
15
-
-
35248827669
-
Software verification with Blast
-
Tenth International Workshop on Model Checking of Software (SPIN), Springer-Verlag
-
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar, and Gregoire Sutre. Software verification with Blast. In Tenth International Workshop on Model Checking of Software (SPIN), volume 2648 of Lecture Notes in Computer Science, pages 235-239. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2648
, pp. 235-239
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
16
-
-
84976858409
-
Binding time analysis: A new PERspective
-
Partial Evaluation and Semantics-Based Program Manipulation (PEPM '91)
-
Sebastian Hunt and David Sands. Binding time analysis: A new PERspective. In Partial Evaluation and Semantics-Based Program Manipulation (PEPM '91), volume 26 (9) of Sigplan Notices, pages 154-165, 1991.
-
(1991)
Sigplan Notices
, vol.26
, Issue.9
, pp. 154-165
-
-
Hunt, S.1
Sands, D.2
-
19
-
-
0023231848
-
Specifications for multi-level security and a hook-up
-
April 27-29, 1987
-
Daryl McCullough. Specifications for multi-level security and a hook-up. In IEEE Symposium on Security and Privacy, April 27-29, 1987, pages 161-166, 1987.
-
(1987)
IEEE Symposium on Security and Privacy
, pp. 161-166
-
-
McCullough, D.1
-
21
-
-
84944269268
-
Local reasoning about programs that alter data structures
-
Computer Science Logic, Springer
-
Peter O'Hearn, John Reynolds, and Hongseok Yang. Local reasoning about programs that alter data structures. In Computer Science Logic, volume 2142 of LNCS, pages 1-19. Springer, 2001.
-
(2001)
LNCS
, vol.2142
, pp. 1-19
-
-
O'Hearn, P.1
Reynolds, J.2
Yang, H.3
-
25
-
-
0036051192
-
Separation logic: A logic for shared mutable data structures
-
IEEE Computer Society Press
-
John C. Reynolds. Separation logic: a logic for shared mutable data structures. In IEEE Symposium on Logic in Computer Science (LICS), pages 55-74. IEEE Computer Society Press, 2002.
-
(2002)
IEEE Symposium on Logic in Computer Science (LICS)
, pp. 55-74
-
-
Reynolds, J.C.1
-
28
-
-
0035276729
-
A Per model of secure information flow in sequential programs
-
Andrei Sabelfeld and David Sands. A Per model of secure information flow in sequential programs. Higher-order and Symbolic Computation, 14(1):59-91, 2001.
-
(2001)
Higher-order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
29
-
-
84956989228
-
A type-based approach to program security
-
number 1214 in Lecture Notes in Computer Science, Springer-Verlag
-
Dennis Volpano and Geoffrey Smith. A type-based approach to program security. In Proceedings of TAPSOFT'97, number 1214 in Lecture Notes in Computer Science, pages 607-621. Springer-Verlag, 1997.
-
(1997)
Proceedings of TAPSOFT'97
, pp. 607-621
-
-
Volpano, D.1
Smith, G.2
|