-
1
-
-
38349055662
-
Computationally sound typing for non-interference: The case of deterministic encryption
-
Technical report, VERIMAG-University of Grenoble and CNRS
-
Courant, J., Ene, C., Lakhnech, Y.: Computationally sound typing for non-interference: The case of deterministic encryption. Technical report, VERIMAG-University of Grenoble and CNRS (2007)
-
(2007)
-
-
Courant, J.1
Ene, C.2
Lakhnech, Y.3
-
2
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504-513 (1977)
-
(1977)
Commun. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
4
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
Sands, D, ed, ESOP 2001 and ETAPS 2001, Springer, Heidelberg
-
Laud, P.: Semantics and program analysis of computationally secure information flow. In: Sands, D. (ed.) ESOP 2001 and ETAPS 2001. LNCS, vol. 2028, pp. 77-91. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2028
, pp. 77-91
-
-
Laud, P.1
-
5
-
-
35248840989
-
Handling encryption in an analysis for secure information flow
-
Degano, P, ed, ESOP 2003 and ETAPS 2003, Springer, Heidelberg
-
Laud, P.: Handling encryption in an analysis for secure information flow. In: Degano, P. (ed.) ESOP 2003 and ETAPS 2003. LNCS, vol. 2618, pp. 159-173. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2618
, pp. 159-173
-
-
Laud, P.1
-
6
-
-
26844509701
-
-
Laud, P., Vene, V.: A type system for computationally secure information flow. In: Liśkiewicz, M., Reischuk, R. (eds.) FCT 2005. LNCS, 3623, pp. 365-377. Springer, Heidelberg (2005)
-
Laud, P., Vene, V.: A type system for computationally secure information flow. In: Liśkiewicz, M., Reischuk, R. (eds.) FCT 2005. LNCS, vol. 3623, pp. 365-377. Springer, Heidelberg (2005)
-
-
-
-
7
-
-
38349069613
-
-
Malacaria, P.: Assessing security threats of looping constructs. In: Hofmann, M., Felleisen, M. (eds.) POPL, ACM, New York (2007)
-
Malacaria, P.: Assessing security threats of looping constructs. In: Hofmann, M., Felleisen, M. (eds.) POPL, ACM, New York (2007)
-
-
-
-
8
-
-
26444517444
-
-
Phan, D.H., Pointcheval, D.: About the security of ciphers (semantic security and pseudo-random permutations). In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, 3357, pp. 182-197. Springer, Heidelberg (2004)
-
Phan, D.H., Pointcheval, D.: About the security of ciphers (semantic security and pseudo-random permutations). In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 182-197. Springer, Heidelberg (2004)
-
-
-
-
9
-
-
0037251378
-
-
Sabelfeld, A., Myers, A.: Language-Based Information-Flow Security. IEEE Journal on Selected Areas in Comunications 21, 5-19 (2003) [10] Sabelfeld, A., Sands, D.: Declassification: Dimensions and principles. Journal of Computer Security (2007) [11] Smith, G., Alpzar, R.: Secure information flow with random assignment and encryption. In: FMSE, pp. 33-44 (2006)
-
Sabelfeld, A., Myers, A.: Language-Based Information-Flow Security. IEEE Journal on Selected Areas in Comunications 21, 5-19 (2003) [10] Sabelfeld, A., Sands, D.: Declassification: Dimensions and principles. Journal of Computer Security (2007) [11] Smith, G., Alpzar, R.: Secure information flow with random assignment and encryption. In: FMSE, pp. 33-44 (2006)
-
-
-
-
10
-
-
0033683194
-
-
Volpano, D.M.: Secure introduction of one-way functions. In: CSFW, pp. 246-254 (2000)
-
Volpano, D.M.: Secure introduction of one-way functions. In: CSFW, pp. 246-254 (2000)
-
-
-
-
11
-
-
0030370740
-
A sound type system for secure flow analysis
-
Volpano, D.M., Irvine, C.E., Smith, G.: A sound type system for secure flow analysis. Journal of Computer Security 4(2/3), 167-188 (1996)
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-188
-
-
Volpano, D.M.1
Irvine, C.E.2
Smith, G.3
|