메뉴 건너뛰기




Volumn 2004, Issue , 2004, Pages 179-193

Run-time principals in information-flow type systems

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION-FLOW TYPE SYSTEMS; INFRASTRUCTURES; RUN-TIME INFORMATION; SECURITY POLICIES;

EID: 3543147869     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2004.1301323     Document Type: Conference Paper
Times cited : (38)

References (36)
  • 1
    • 0031637195 scopus 로고    scopus 로고
    • On SDSI's linked local name spaces
    • M. Abadi. On SDSI's linked local name spaces. Journal of Computer Security, 6(1-2):3-21, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 3-21
    • Abadi, M.1
  • 11
    • 0024984237 scopus 로고
    • An architecture for practical delegation in a distributed system
    • IEEE Computer Society Press
    • M. Gasserand E. McDermott. An architecture for practical delegation in a distributed system. In Proc. IEEE Symposium on Security and Privacy, pages 20-30. IEEE Computer Society Press, 1990.
    • (1990) Proc. IEEE Symposium on Security and Privacy , pp. 20-30
    • Gasserand, M.1    McDermott, E.2
  • 12
  • 16
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certificate revocation
    • T. Jim. SD3: a trust management system with certificate revocation. In IEEE Symposium on Security and Privacy, pages 106-115, 2001.
    • (2001) IEEE Symposium on Security and Privacy , pp. 106-115
    • Jim, T.1
  • 21
    • 0031682833 scopus 로고    scopus 로고
    • Complete, safe information flow with decentralized labels
    • Oakland, CA, USA, May
    • A. C. Myers and B. Liskov. Complete, safe information flow with decentralized labels. In Proc. IEEE Symposium on Security and Privacy, pages 186-197, Oakland, CA, USA, May 1998.
    • (1998) Proc. IEEE Symposium on Security and Privacy , pp. 186-197
    • Myers, A.C.1    Liskov, B.2
  • 28
    • 0035276729 scopus 로고    scopus 로고
    • A PER model of secure information flow in sequential programs
    • Mar.
    • A. Sabelfeld and D. Sands. A PER model of secure information flow in sequential programs. Higher-Order and Symbolic Computation, 14(1):59-91, Mar. 2001.
    • (2001) Higher-order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 30
    • 3543071327 scopus 로고    scopus 로고
    • Run-time principals in information-flow type systems
    • University of Pennsylvania
    • S. Tse and S. Zdancewic. Run-time principals in information-flow type systems. Technical Report MSCIS-03-39, University of Pennsylvania, 2004.
    • (2004) Technical Report , vol.MSCIS-03-39
    • Tse, S.1    Zdancewic, S.2
  • 32
    • 0039334688 scopus 로고    scopus 로고
    • The security architecture formerly known as stack inspection: A security mechanism for language-based systems
    • Oct.
    • D.S. Wallach, A. W. Appel, and E. W. Felten. The security architecture formerly known as stack inspection: A security mechanism for language-based systems. ACM Transactions on Software Engineering and Methodology, 9(4), Oct. 2000.
    • (2000) ACM Transactions on Software Engineering and Methodology , vol.9 , Issue.4
    • Wallach, D.S.1    Appel, A.W.2    Felten, E.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.