-
1
-
-
0032681509
-
A core calculus of dependency
-
January
-
M. Abadi, A. Banerjee, N. Heintze, and J. Riecke. A core calculus of dependency. In Proc. ACM Symp. on Principles of Programming Languages, pages 147-160, January 1999.
-
(1999)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.4
-
2
-
-
34548715313
-
Gradual release: Unifying declassification, encryption and key release policies
-
May
-
A. Askarov and A. Sabelfeld. Gradual release: Unifying declassification, encryption and key release policies. In Proc. IEEE Symp. on Security and Privacy, May 2007.
-
(2007)
Proc. IEEE Symp. on Security and Privacy
-
-
Askarov, A.1
Sabelfeld, A.2
-
4
-
-
33745794062
-
Flow locks: Towards a core calculus for dynamic flow policies
-
Proc. European Symp. on Programming, of, Springer-Verlag
-
N. Broberg and D. Sands. Flow locks: Towards a core calculus for dynamic flow policies. In Proc. European Symp. on Programming, volume 3924 of LNCS, pages 180-196. Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.3924
, pp. 180-196
-
-
Broberg, N.1
Sands, D.2
-
6
-
-
0001760770
-
Information transmission in sequential programs
-
R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Academic Press
-
E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
8
-
-
2442507870
-
Abstract non-interference: Parameterizing non-interference by abstract interpretation
-
January
-
R. Giacobazzi and I. Mastroeni. Abstract non-interference: Parameterizing non-interference by abstract interpretation. In Proc. ACM Symp. on Principles of Programming Languages, pages 186-197, January 2004.
-
(2004)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 186-197
-
-
Giacobazzi, R.1
Mastroeni, I.2
-
9
-
-
24644453685
-
Adjoining declassification and attack models by abstract interpretation
-
Proc. European Symp. on Programming, of, Springer-Verlag, April
-
R. Giacobazzi and I. Mastroeni. Adjoining declassification and attack models by abstract interpretation. In Proc. European Symp. on Programming, volume 3444 of LNCS, pages 295-310. Springer-Verlag, April 2005.
-
(2005)
LNCS
, vol.3444
, pp. 295-310
-
-
Giacobazzi, R.1
Mastroeni, I.2
-
10
-
-
0033751850
-
A semantic approach to secure information flow
-
R. Joshi and K. R. M. Leino. A semantic approach to secure information flow. Science of Computer Programming, 37(1-3):113-138, 2000.
-
(2000)
Science of Computer Programming
, vol.37
, Issue.1-3
, pp. 113-138
-
-
Joshi, R.1
Leino, K.R.M.2
-
12
-
-
84881123660
-
Information flow control and applications-Bridging a gap
-
Proc. Formal Methods Europe, of, Springer-Verlag, March
-
H. Mantel. Information flow control and applications-Bridging a gap. In Proc. Formal Methods Europe, volume 2021 of LNCS, pages 153-172. Springer-Verlag, March 2001.
-
(2001)
LNCS
, vol.2021
, pp. 153-172
-
-
Mantel, H.1
-
13
-
-
37149055443
-
Controlling the what and where of declassification in language-based security
-
Proc. European Symp. on Programming, of, Springer-Verlag
-
H. Mantel and A. Reinhard. Controlling the what and where of declassification in language-based security. In Proc. European Symp. on Programming, volume 4421 of LNCS, pages 141-156. Springer-Verlag, 2007.
-
(2007)
LNCS
, vol.4421
, pp. 141-156
-
-
Mantel, H.1
Reinhard, A.2
-
14
-
-
35048815139
-
Controlled downgrading based on intransitive (non)interference
-
Proc. Asian Symp. on Programming Languages and Systems, of, Springer-Verlag, November
-
H. Mantel and D. Sands. Controlled downgrading based on intransitive (non)interference. In Proc. Asian Symp. on Programming Languages and Systems, volume 3302 of LNCS, pages 129-145. Springer-Verlag, November 2004.
-
(2004)
LNCS
, vol.3302
, pp. 129-145
-
-
Mantel, H.1
Sands, D.2
-
15
-
-
0042361083
-
Non-deterministic admissible interference
-
J. Mullins. Non-deterministic admissible interference. J. of Universal Computer Science, 6(11): 1054-1070, 2000.
-
(2000)
J. of Universal Computer Science
, vol.6
, Issue.11
, pp. 1054-1070
-
-
Mullins, J.1
-
16
-
-
0029228214
-
Absorbing covers and intransitive non-interference
-
May
-
S. Pinsky. Absorbing covers and intransitive non-interference. In Proc. IEEE Symp. on Security and Privacy, pages 102-113, May 1995.
-
(1995)
Proc. IEEE Symp. on Security and Privacy
, pp. 102-113
-
-
Pinsky, S.1
-
20
-
-
0003502331
-
Noninterference, transitivity, and channel-control security policies
-
Technical Report CSL-92-02, SRI International, 1992
-
J. M. Rushby. Noninterference, transitivity, and channel-control security policies. Technical Report CSL-92-02, SRI International, 1992.
-
-
-
Rushby, J.M.1
-
22
-
-
35048828759
-
A model for delimited information release
-
Proc. International Symp. on Software Security ISSS'03, of, Springer-Verlag, October
-
A. Sabelfeld and A. C. Myers. A model for delimited information release. In Proc. International Symp. on Software Security (ISSS'03), volume 3233 of LNCS, pages 174-191. Springer-Verlag, October 2004.
-
(2004)
LNCS
, vol.3233
, pp. 174-191
-
-
Sabelfeld, A.1
Myers, A.C.2
-
23
-
-
0035276729
-
A per model of secure information flow in sequential programs
-
March
-
A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher Order and Symbolic Computation, 14(1):59-91, March 2001.
-
(2001)
Higher Order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
25
-
-
34548754820
-
Declassification: Dimensions and principles
-
To appear
-
A. Sabelfeld and D. Sands. Declassification: Dimensions and principles. J. Computer Security, 2007. To appear.
-
(2007)
J. Computer Security
-
-
Sabelfeld, A.1
Sands, D.2
-
26
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3): 167-187, 1996.
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|