-
5
-
-
35048854474
-
-
J. Brown and T. Knight, Jr. A minimal trusted computing base for dynamically ensuring secure information flow. Technical, report, MIT, November 2001.
-
J. Brown and T. Knight, Jr. A minimal trusted computing base for dynamically ensuring secure information flow. Technical, report, MIT, November 2001.
-
-
-
-
8
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning. A lattice model of secure information flow. Communications of ACM, 19(5):236-243, 1976.
-
(1976)
Communications of ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
9
-
-
0004238984
-
-
Addison-Wesley Longman Publishing Co, Inc, Boston, MA, USA
-
D. E. R. Denning. Cryptography and Data Security. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1982.
-
(1982)
Cryptography and Data Security
-
-
Denning, D.E.R.1
-
10
-
-
0016382977
-
Memoryless subsystems
-
J. S. Fenton. Memoryless subsystems. Computer Journal, 17(2):143-147, 1974.
-
(1974)
Computer Journal
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
11
-
-
0017014045
-
Memoryless execution: A programmer's viewpoint
-
Oct-Dec
-
I. Gat and H. J. Saal. Memoryless execution: A programmer's viewpoint. Software Practice and Experience, 6(4):463-471, Oct-Dec 1976.
-
(1976)
Software Practice and Experience
, vol.6
, Issue.4
, pp. 463-471
-
-
Gat, I.1
Saal, H.J.2
-
30
-
-
35048876536
-
-
P. Shroff, S. F. Smith, and M. Thober. Dynamic dependency monitoring to secure information flow. Technical report, Department of Computer Science, Johns Hopkins Univeristy, February 2007. http://www.cs.jhu.edu/~scott/pll/papers/ dynamic-monitoring-tr.pdf.
-
P. Shroff, S. F. Smith, and M. Thober. Dynamic dependency monitoring to secure information flow. Technical report, Department of Computer Science, Johns Hopkins Univeristy, February 2007. http://www.cs.jhu.edu/~scott/pll/papers/ dynamic-monitoring-tr.pdf.
-
-
-
-
34
-
-
21644475650
-
RIFLE: An architectural framework for user-centric information-flow security
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. RIFLE: An architectural framework for user-centric information-flow security. In MLCRO '04: International Symposium on Micro architecture, 2004.
-
(2004)
MLCRO '04: International Symposium on Micro architecture
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
35
-
-
0030370740
-
A sound type system for secure flow analysis
-
Dec
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, Dec. 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
36
-
-
84945708259
-
A theorem on boolean matrices
-
S. Warshall. A theorem on boolean matrices. Journal of the ACM, 9(1):11-12, 1962.
-
(1962)
Journal of the ACM
, vol.9
, Issue.1
, pp. 11-12
-
-
Warshall, S.1
-
39
-
-
0016069660
-
Hydra: The kernel of a multiprocessor operating system
-
W. Wulf, E. Cohen, W. Corwin, A. Jones, R. Levin, C. Pierson, and F. Pollack. Hydra: the kernel of a multiprocessor operating system. Communications of ACM, 17(6):337-345, 1974.
-
(1974)
Communications of ACM
, vol.17
, Issue.6
, pp. 337-345
-
-
Wulf, W.1
Cohen, E.2
Corwin, W.3
Jones, A.4
Levin, R.5
Pierson, C.6
Pollack, F.7
|