메뉴 건너뛰기




Volumn 3148, Issue , 2004, Pages 84-99

Modular and constraint-based information flow inference for an object-oriented language

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL LINGUISTICS; OBJECT ORIENTED PROGRAMMING; STATIC ANALYSIS;

EID: 35048864843     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-27864-1_9     Document Type: Article
Times cited : (24)

References (21)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • September
    • Martin Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, September 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 84948972811 scopus 로고
    • The cartesian product algorithm: Simple and precise type inference of parametric polymorphism
    • Ole Agesen. The cartesian product algorithm: Simple and precise type inference of parametric polymorphism. In European Conference on Object Oriented Programming (ECOOP), pages 2-26, 1995.
    • (1995) European Conference on Object Oriented Programming (ECOOP) , pp. 2-26
    • Agesen, O.1
  • 3
    • 84948752619 scopus 로고    scopus 로고
    • Secure information flow and pointer confinement in a Java-like language
    • IEEE Computer Society Press
    • Anindya Banerjee and David A. Naumann. Secure information flow and pointer confinement in a Java-like language. In IEEE Computer Security Foundations Workshop (CSFW), pages 253-270. IEEE Computer Society Press, 2002.
    • (2002) IEEE Computer Security Foundations Workshop (CSFW) , pp. 253-270
    • Banerjee, A.1    Naumann, D.A.2
  • 5
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Dorothy Denning and Peter Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.1    Denning, P.2
  • 8
    • 85027621869 scopus 로고
    • Polymorphic type schemes and recursive definitions
    • number 166 in Lecture Notes in Computer Science. Springer-Verlag
    • Alan Mycroft. Polymorphic type schemes and recursive definitions. In Sixth International Symposium on Programming, number 166 in Lecture Notes in Computer Science. Springer-Verlag, 1984.
    • (1984) Sixth International Symposium on Programming
    • Mycroft, A.1
  • 15
    • 3543056029 scopus 로고    scopus 로고
    • Flow Caml in a nutshell. in Graham Hutton, editor
    • March
    • Vincent Simonet. Flow Caml in a nutshell. In Graham Hutton, editor, Proceedings of the first APPSEM-II workshop, pages 152-165, March 2003.
    • (2003) Proceedings of the First APPSEM-II Workshop , pp. 152-165
    • Simonet, V.1
  • 16
    • 24344486699 scopus 로고    scopus 로고
    • The Flow Caml System: Documentation and user's manual
    • Institut National de Recherche en Informatique et en Automatique (INRIA), July
    • Vincent Simonet. The Flow Caml System: documentation and user's manual. Technical Report 0282, Institut National de Recherche en Informatique et en Automatique (INRIA), July 2003.
    • (2003) Technical Report , vol.282
    • Simonet, V.1
  • 17
    • 14844312689 scopus 로고    scopus 로고
    • Syntactic type soundness for HM(X)
    • Proceedings of the Workshop on Types in Programming (TIP'02), July
    • Christian Skalka and François Pottier. Syntactic type soundness for HM(X). In Proceedings of the Workshop on Types in Programming (TIP'02), volume 75 of Electronic Notes in Theoretical, Computer Science, July 2002.
    • (2002) Electronic Notes in Theoretical, Computer Science , vol.75
    • Skalka, C.1    Pottier, F.2
  • 18
    • 35048839245 scopus 로고    scopus 로고
    • Naumann. Constraint-based security flow inferencer for a Java-like language
    • Kansas State University, In preparation
    • Qi Sun, Anindya Banerjee, and David A. Naumann. Constraint-based security flow inferencer for a Java-like language. Technical Report KSU CIS TR-2004-2, Kansas State University, 2004. In preparation.
    • (2004) Technical Report , vol.KSU CIS TR-2004-2
    • Sun, Q.1    Banerjee, A.2    David, A.3
  • 19
    • 84956989228 scopus 로고    scopus 로고
    • A type-based approach to program security
    • number 1214 in Lecture Notes in Computer Science, Springer-Verlag
    • Dennis Volpano and Geoffrey Smith. A type-based approach to program security. In Proceedings of TAPSOFT'97, number 1214 in Lecture Notes in Computer Science, pages 607-621. Springer-Verlag, 1997.
    • (1997) Proceedings of TAPSOFT'97 , pp. 607-621
    • Volpano, D.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.