-
2
-
-
28144441375
-
-
A. Almeida Matos and G. Boudol. On declassification and the non-disclosure policy. In In Proc. IEEE Computer Security Foundations Workshop, 2005.
-
A. Almeida Matos and G. Boudol. On declassification and the non-disclosure policy. In In Proc. IEEE Computer Security Foundations Workshop, 2005.
-
-
-
-
3
-
-
0001760770
-
Information transmission in sequential programs
-
Academic Press
-
E. Cohen. Information transmission in sequential programs. In Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.1
-
6
-
-
0020299523
-
Security Policies and Security Models
-
Oakland, CA, USA
-
J. A. Goguen and J. Meseguer. Security Policies and Security Models. In Proceedings of the IEEE Symposium on Security and Privacy, pages 11-20, Oakland, CA, USA, 1982.
-
(1982)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 11-20
-
-
Goguen, J.A.1
Meseguer, J.2
-
7
-
-
28144461940
-
Downgrading policies and relaxed noninterference
-
New York, NY, USA
-
P. Li and S. Zdancewic. Downgrading policies and relaxed noninterference. In Proc. of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 158-170, New York, NY, USA, 2005.
-
(2005)
Proc. of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages
, pp. 158-170
-
-
Li, P.1
Zdancewic, S.2
-
9
-
-
35048815139
-
Controlled Declassification based on Intransitive Non-interference
-
Proceedings of the 2nd ASIAN Symposium on Programming Languages and Systems, APLAS 2004, Taipei, Taiwan
-
H. Mantel and D. Sands. Controlled Declassification based on Intransitive Non-interference. In Proceedings of the 2nd ASIAN Symposium on Programming Languages and Systems, APLAS 2004, LNCS 3303, pages 129-145, Taipei, Taiwan, 2004.
-
(2004)
LNCS
, vol.3303
, pp. 129-145
-
-
Mantel, H.1
Sands, D.2
-
10
-
-
0344875573
-
Approximate Non-interference
-
A. Di Pierro, C. Hankin, and H. Wiklicky. Approximate Non-interference. Journal of Computer Security, 12(1):37-81, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 37-81
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
11
-
-
33745197683
-
Confidentiality for Multithreaded Programs via Bisimulation
-
Proceedings of Andrei Ershov 5th International Conference on Perspectives of System Informatics, number in
-
A. Sabelfeld. Confidentiality for Multithreaded Programs via Bisimulation. In Proceedings of Andrei Ershov 5th International Conference on Perspectives of System Informatics, number 2890 in LNCS, pages 260-274, 2003.
-
(2003)
LNCS
, vol.2890
, pp. 260-274
-
-
Sabelfeld, A.1
-
14
-
-
84957869855
-
A Per Model of Secure Information Flow in Sequential Programs
-
Proceedings of the 8th European Symposium on Programming
-
A. Sabelfeld and D. Sands. A Per Model of Secure Information Flow in Sequential Programs. In Proceedings of the 8th European Symposium on Programming, LNCS, pages 50-59, 1999.
-
(1999)
LNCS
, pp. 50-59
-
-
Sabelfeld, A.1
Sands, D.2
|