-
1
-
-
33745806932
-
-
T. Amtoft, S. Bandhakavi, and A. Banerjee. A logic for information flow in object-oriented programs. In POPL, 2006. Extended version available as KSU CIS-TR-2005-1.
-
T. Amtoft, S. Bandhakavi, and A. Banerjee. A logic for information flow in object-oriented programs. In POPL, 2006. Extended version available as KSU CIS-TR-2005-1.
-
-
-
-
3
-
-
36448980725
-
What you lose is what you leak: Information leakage in declassification policies
-
A. Banerjee, R. Giacobazzi, and I. Mastroeni. What you lose is what you leak: Information leakage in declassification policies. In MFPS, 2007.
-
(2007)
MFPS
-
-
Banerjee, A.1
Giacobazzi, R.2
Mastroeni, I.3
-
4
-
-
17044429386
-
Stack-based access control for secure information flow
-
Special issue on Language Based Security
-
A. Banerjee and D. A. Naumann. Stack-based access control for secure information flow. Journal of Functional Programming, 15(2):131-177, 2005. Special issue on Language Based Security.
-
(2005)
Journal of Functional Programming
, vol.15
, Issue.2
, pp. 131-177
-
-
Banerjee, A.1
Naumann, D.A.2
-
5
-
-
4944265699
-
Secure information flow by self-composition
-
G. Barthe, P. R. D'Argenio, and T. Rezk. Secure information flow by self-composition. In CSFW, 2004.
-
(2004)
CSFW
-
-
Barthe, G.1
D'Argenio, P.R.2
Rezk, T.3
-
6
-
-
2442575906
-
Simple relational correctness proofs for static analyses and program transformations
-
N. Benton. Simple relational correctness proofs for static analyses and program transformations. In POPL, 2004.
-
(2004)
POPL
-
-
Benton, N.1
-
8
-
-
14844300105
-
-
S. Chong and A. C. Myers. Security policies for downgrading. In CCS, 2004.
-
S. Chong and A. C. Myers. Security policies for downgrading. In CCS, 2004.
-
-
-
-
9
-
-
36448989390
-
-
E. S. Cohen. Information transmission in sequential programs. In A. K. J. Richard A. DeMillo, David P. Dobkin and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
E. S. Cohen. Information transmission in sequential programs. In A. K. J. Richard A. DeMillo, David P. Dobkin and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
-
-
-
10
-
-
84858473969
-
-
A. Darvas, R. Hähnle, and D. Sands. A theorem proving approach to analysis of secure information flow. In SPC, 2005.
-
A. Darvas, R. Hähnle, and D. Sands. A theorem proving approach to analysis of secure information flow. In SPC, 2005.
-
-
-
-
12
-
-
33745957768
-
Trusted declassification: High-level policy for a security-typed language
-
B. Hicks, D. King, P. McDaniel, and M. Hicks. Trusted declassification: high-level policy for a security-typed language. In PLAS, 2006.
-
(2006)
PLAS
-
-
Hicks, B.1
King, D.2
McDaniel, P.3
Hicks, M.4
-
13
-
-
17044419772
-
Controlled declassification based on intransitive noninterference
-
H. Mantel and D. Sands. Controlled declassification based on intransitive noninterference. In APLAS, 2004.
-
(2004)
APLAS
-
-
Mantel, H.1
Sands, D.2
-
14
-
-
33746064873
-
The shadow knows: Refinement of ignorance in sequential programs
-
Mathematics of Program Construction, of
-
C. Morgan. The shadow knows: Refinement of ignorance in sequential programs. In Mathematics of Program Construction, volume 4014 of LNCS, 2006.
-
(2006)
LNCS
, vol.4014
-
-
Morgan, C.1
-
15
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
A. C. Myers. JFlow: Practical mostly-static information flow control. In POPL, 1999.
-
(1999)
POPL
-
-
Myers, A.C.1
-
16
-
-
51749086527
-
From coupling relations to mated invariants for secure information flow and data abstraction
-
D. A. Naumann. From coupling relations to mated invariants for secure information flow and data abstraction. In ESORICS, 2006.
-
(2006)
ESORICS
-
-
Naumann, D.A.1
-
20
-
-
4944241159
-
A model for delimited information release
-
A. Sabelfeld and A. C. Myers. A model for delimited information release. In ISSS, 2004.
-
(2004)
ISSS
-
-
Sabelfeld, A.1
Myers, A.C.2
-
21
-
-
36448984046
-
-
A. Sabelfeld and D. Sands. Dimensions and principles of declassification. In CSFW, 2005. Full version to appear in Journal of Computer Security, 2007.
-
A. Sabelfeld and D. Sands. Dimensions and principles of declassification. In CSFW, 2005. Full version to appear in Journal of Computer Security, 2007.
-
-
-
-
22
-
-
36448951303
-
-
T. Terauchi and A. Aiken. Secure information flow as a safety problem. In SAS, 2005.
-
T. Terauchi and A. Aiken. Secure information flow as a safety problem. In SAS, 2005.
-
-
-
-
23
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|