메뉴 건너뛰기




Volumn , Issue , 2007, Pages 67-72

Fast probabilistic simulation, nontermination, and secure information flow

Author keywords

Probabilistic noninterference; Type systems

Indexed keywords

NONINTERFERENCE PROPERTY; NONTERMINATION; PROBABILISTIC PROGRAMS; SECURE INFORMATION FLOW;

EID: 36448950520     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1255329.1255341     Document Type: Conference Paper
Times cited : (6)

References (23)
  • 1
    • 33745806932 scopus 로고    scopus 로고
    • T. Amtoft, S. Bandhakavi, and A. Banerjee. A logic for information flow in object-oriented programs. In POPL, 2006. Extended version available as KSU CIS-TR-2005-1.
    • T. Amtoft, S. Bandhakavi, and A. Banerjee. A logic for information flow in object-oriented programs. In POPL, 2006. Extended version available as KSU CIS-TR-2005-1.
  • 2
    • 34548715313 scopus 로고    scopus 로고
    • Gradual release: Unifying declassification, encryption and key release policies
    • To appear
    • A. Askarov and A. Sabelfeld. Gradual release: Unifying declassification, encryption and key release policies. In 2007 IEEE Symposium on Security and Privacy. To appear.
    • 2007 IEEE Symposium on Security and Privacy
    • Askarov, A.1    Sabelfeld, A.2
  • 3
    • 36448980725 scopus 로고    scopus 로고
    • What you lose is what you leak: Information leakage in declassification policies
    • A. Banerjee, R. Giacobazzi, and I. Mastroeni. What you lose is what you leak: Information leakage in declassification policies. In MFPS, 2007.
    • (2007) MFPS
    • Banerjee, A.1    Giacobazzi, R.2    Mastroeni, I.3
  • 4
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based access control for secure information flow
    • Special issue on Language Based Security
    • A. Banerjee and D. A. Naumann. Stack-based access control for secure information flow. Journal of Functional Programming, 15(2):131-177, 2005. Special issue on Language Based Security.
    • (2005) Journal of Functional Programming , vol.15 , Issue.2 , pp. 131-177
    • Banerjee, A.1    Naumann, D.A.2
  • 5
    • 4944265699 scopus 로고    scopus 로고
    • Secure information flow by self-composition
    • G. Barthe, P. R. D'Argenio, and T. Rezk. Secure information flow by self-composition. In CSFW, 2004.
    • (2004) CSFW
    • Barthe, G.1    D'Argenio, P.R.2    Rezk, T.3
  • 6
    • 2442575906 scopus 로고    scopus 로고
    • Simple relational correctness proofs for static analyses and program transformations
    • N. Benton. Simple relational correctness proofs for static analyses and program transformations. In POPL, 2004.
    • (2004) POPL
    • Benton, N.1
  • 8
    • 14844300105 scopus 로고    scopus 로고
    • S. Chong and A. C. Myers. Security policies for downgrading. In CCS, 2004.
    • S. Chong and A. C. Myers. Security policies for downgrading. In CCS, 2004.
  • 9
    • 36448989390 scopus 로고    scopus 로고
    • E. S. Cohen. Information transmission in sequential programs. In A. K. J. Richard A. DeMillo, David P. Dobkin and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
    • E. S. Cohen. Information transmission in sequential programs. In A. K. J. Richard A. DeMillo, David P. Dobkin and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
  • 10
    • 84858473969 scopus 로고    scopus 로고
    • A. Darvas, R. Hähnle, and D. Sands. A theorem proving approach to analysis of secure information flow. In SPC, 2005.
    • A. Darvas, R. Hähnle, and D. Sands. A theorem proving approach to analysis of secure information flow. In SPC, 2005.
  • 12
    • 33745957768 scopus 로고    scopus 로고
    • Trusted declassification: High-level policy for a security-typed language
    • B. Hicks, D. King, P. McDaniel, and M. Hicks. Trusted declassification: high-level policy for a security-typed language. In PLAS, 2006.
    • (2006) PLAS
    • Hicks, B.1    King, D.2    McDaniel, P.3    Hicks, M.4
  • 13
    • 17044419772 scopus 로고    scopus 로고
    • Controlled declassification based on intransitive noninterference
    • H. Mantel and D. Sands. Controlled declassification based on intransitive noninterference. In APLAS, 2004.
    • (2004) APLAS
    • Mantel, H.1    Sands, D.2
  • 14
    • 33746064873 scopus 로고    scopus 로고
    • The shadow knows: Refinement of ignorance in sequential programs
    • Mathematics of Program Construction, of
    • C. Morgan. The shadow knows: Refinement of ignorance in sequential programs. In Mathematics of Program Construction, volume 4014 of LNCS, 2006.
    • (2006) LNCS , vol.4014
    • Morgan, C.1
  • 15
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • A. C. Myers. JFlow: Practical mostly-static information flow control. In POPL, 1999.
    • (1999) POPL
    • Myers, A.C.1
  • 16
    • 51749086527 scopus 로고    scopus 로고
    • From coupling relations to mated invariants for secure information flow and data abstraction
    • D. A. Naumann. From coupling relations to mated invariants for secure information flow and data abstraction. In ESORICS, 2006.
    • (2006) ESORICS
    • Naumann, D.A.1
  • 20
    • 4944241159 scopus 로고    scopus 로고
    • A model for delimited information release
    • A. Sabelfeld and A. C. Myers. A model for delimited information release. In ISSS, 2004.
    • (2004) ISSS
    • Sabelfeld, A.1    Myers, A.C.2
  • 21
    • 36448984046 scopus 로고    scopus 로고
    • A. Sabelfeld and D. Sands. Dimensions and principles of declassification. In CSFW, 2005. Full version to appear in Journal of Computer Security, 2007.
    • A. Sabelfeld and D. Sands. Dimensions and principles of declassification. In CSFW, 2005. Full version to appear in Journal of Computer Security, 2007.
  • 22
    • 36448951303 scopus 로고    scopus 로고
    • T. Terauchi and A. Aiken. Secure information flow as a safety problem. In SAS, 2005.
    • T. Terauchi and A. Aiken. Secure information flow as a safety problem. In SAS, 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.