-
1
-
-
0031637195
-
On SDSI's linked local name spaces
-
M. Abadi. On SDSI's linked local name spaces. Journal of Computer Security, 6(1-2):3-21, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 3-21
-
-
Abadi, M.1
-
2
-
-
0032681509
-
A core calculus of dependency
-
San Antonio, TX, Jan.
-
M. Abadi, A. Banerjee, N. Heintze, and J. Riecke. A core calculus of dependency. In Proc. 26th ACM Symp. on Principles of Programming Languages (POPL), pages 147-160, San Antonio, TX, Jan. 1999.
-
(1999)
Proc. 26th ACM Symp. on Principles of Programming Languages (POPL)
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.4
-
3
-
-
0027667638
-
A calculus for access control in distributed systems
-
Sept.
-
M. Abadi, M. Burrows, B. W. Lampson, and G. D. Plotkin. A calculus for access control in distributed systems. Transactions on Programming Languages and Systems, 15(4):706-734, Sept. 1993.
-
(1993)
Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.W.3
Plotkin, G.D.4
-
8
-
-
0032670229
-
Typed memory management in a calculus of capabilities
-
San Antonio, Texas, Jan.
-
K. Crary, D. Walker, and G. Morrisett. Typed memory management in a calculus of capabilities. In Proc. 26th ACM Symp. on Principles of Programming Languages (POPL), pages 262-275, San Antonio, Texas, Jan. 1999.
-
(1999)
Proc. 26th ACM Symp. on Principles of Programming Languages (POPL)
, pp. 262-275
-
-
Crary, K.1
Walker, D.2
Morrisett, G.3
-
9
-
-
0036850258
-
Intensional polymorphism in type erasure semantics
-
Nov.
-
K. Crary, S. Weirich, and G. Morrisett. Intensional polymorphism in type erasure semantics. Journal of Functional Programming, 12(6):567-600, Nov. 2002.
-
(2002)
Journal of Functional Programming
, vol.12
, Issue.6
, pp. 567-600
-
-
Crary, K.1
Weirich, S.2
Morrisett, G.3
-
11
-
-
0024984237
-
An architecture for practical delegation in a distributed system
-
IEEE Computer Society Press
-
M. Gasserand E. McDermott. An architecture for practical delegation in a distributed system. In Proc. IEEE Symposium on Security and Privacy, pages 20-30. IEEE Computer Society Press, 1990.
-
(1990)
Proc. IEEE Symposium on Security and Privacy
, pp. 20-30
-
-
Gasserand, M.1
McDermott, E.2
-
16
-
-
0034829512
-
SD3: A trust management system with certificate revocation
-
T. Jim. SD3: a trust management system with certificate revocation. In IEEE Symposium on Security and Privacy, pages 106-115, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 106-115
-
-
Jim, T.1
-
21
-
-
0031682833
-
Complete, safe information flow with decentralized labels
-
Oakland, CA, USA, May
-
A. C. Myers and B. Liskov. Complete, safe information flow with decentralized labels. In Proc. IEEE Symposium on Security and Privacy, pages 186-197, Oakland, CA, USA, May 1998.
-
(1998)
Proc. IEEE Symposium on Security and Privacy
, pp. 186-197
-
-
Myers, A.C.1
Liskov, B.2
-
28
-
-
0035276729
-
A PER model of secure information flow in sequential programs
-
Mar.
-
A. Sabelfeld and D. Sands. A PER model of secure information flow in sequential programs. Higher-Order and Symbolic Computation, 14(1):59-91, Mar. 2001.
-
(2001)
Higher-order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
30
-
-
3543071327
-
Run-time principals in information-flow type systems
-
University of Pennsylvania
-
S. Tse and S. Zdancewic. Run-time principals in information-flow type systems. Technical Report MSCIS-03-39, University of Pennsylvania, 2004.
-
(2004)
Technical Report
, vol.MSCIS-03-39
-
-
Tse, S.1
Zdancewic, S.2
-
31
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
32
-
-
0039334688
-
The security architecture formerly known as stack inspection: A security mechanism for language-based systems
-
Oct.
-
D.S. Wallach, A. W. Appel, and E. W. Felten. The security architecture formerly known as stack inspection: A security mechanism for language-based systems. ACM Transactions on Software Engineering and Methodology, 9(4), Oct. 2000.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
-
-
Wallach, D.S.1
Appel, A.W.2
Felten, E.W.3
|