메뉴 건너뛰기




Volumn , Issue , 2007, Pages 203-217

Dynamic dependency monitoring to secure information flow

Author keywords

[No Author keywords available]

Indexed keywords

INDIRECT INFORMATION FLOWS; RUN-TIME INFORMATION;

EID: 35048880192     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2007.20     Document Type: Conference Paper
Times cited : (71)

References (40)
  • 5
    • 35048854474 scopus 로고    scopus 로고
    • J. Brown and T. Knight, Jr. A minimal trusted computing base for dynamically ensuring secure information flow. Technical, report, MIT, November 2001.
    • J. Brown and T. Knight, Jr. A minimal trusted computing base for dynamically ensuring secure information flow. Technical, report, MIT, November 2001.
  • 8
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning. A lattice model of secure information flow. Communications of ACM, 19(5):236-243, 1976.
    • (1976) Communications of ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 9
    • 0004238984 scopus 로고
    • Addison-Wesley Longman Publishing Co, Inc, Boston, MA, USA
    • D. E. R. Denning. Cryptography and Data Security. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1982.
    • (1982) Cryptography and Data Security
    • Denning, D.E.R.1
  • 10
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • J. S. Fenton. Memoryless subsystems. Computer Journal, 17(2):143-147, 1974.
    • (1974) Computer Journal , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 11
    • 0017014045 scopus 로고
    • Memoryless execution: A programmer's viewpoint
    • Oct-Dec
    • I. Gat and H. J. Saal. Memoryless execution: A programmer's viewpoint. Software Practice and Experience, 6(4):463-471, Oct-Dec 1976.
    • (1976) Software Practice and Experience , vol.6 , Issue.4 , pp. 463-471
    • Gat, I.1    Saal, H.J.2
  • 30
    • 35048876536 scopus 로고    scopus 로고
    • P. Shroff, S. F. Smith, and M. Thober. Dynamic dependency monitoring to secure information flow. Technical report, Department of Computer Science, Johns Hopkins Univeristy, February 2007. http://www.cs.jhu.edu/~scott/pll/papers/ dynamic-monitoring-tr.pdf.
    • P. Shroff, S. F. Smith, and M. Thober. Dynamic dependency monitoring to secure information flow. Technical report, Department of Computer Science, Johns Hopkins Univeristy, February 2007. http://www.cs.jhu.edu/~scott/pll/papers/ dynamic-monitoring-tr.pdf.
  • 35
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Dec
    • D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, Dec. 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 36
    • 84945708259 scopus 로고
    • A theorem on boolean matrices
    • S. Warshall. A theorem on boolean matrices. Journal of the ACM, 9(1):11-12, 1962.
    • (1962) Journal of the ACM , vol.9 , Issue.1 , pp. 11-12
    • Warshall, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.