-
1
-
-
36448959172
-
Secure implementation of cryptographic protocols: A case study of mutual distrust
-
Proceedings of the 10th European Symposium on Research in Computer Security ESORICS '05, Milan, Italy, September, Springer-Verlag
-
A. Askarov and A. Sabelfeld. Secure implementation of cryptographic protocols: A case study of mutual distrust. In Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS '05), LNCS, Milan, Italy, September 2005. Springer-Verlag.
-
(2005)
LNCS
-
-
Askarov, A.1
Sabelfeld, A.2
-
2
-
-
31844457357
-
Composing security policies with polymer
-
New York, NY, USA, ACM Press
-
L. Bauer, J. Ligatti, and D. Walker. Composing security policies with polymer. In PLDI '05: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, pages 305-314, New York, NY, USA, 2005. ACM Press.
-
(2005)
PLDI '05: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation
, pp. 305-314
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
3
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
Technical Report MTR-2547, 1, MITRE Corp, Bedford, MA
-
D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations. Technical Report MTR-2547, Vol. 1, MITRE Corp., Bedford, MA, 1973.
-
(1973)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
6
-
-
84970947585
-
Software engineering for security: A roadmap
-
New York, NY, USA, ACM Press
-
P. T. Devanbu and S. Stubblebine. Software engineering for security: a roadmap. In ICSE '00: Proceedings of the Conference on The Future of Software Engineering, pages 227-239, New York, NY, USA, 2000. ACM Press.
-
(2000)
ICSE '00: Proceedings of the Conference on The Future of Software Engineering
, pp. 227-239
-
-
Devanbu, P.T.1
Stubblebine, S.2
-
8
-
-
39049113405
-
-
FTC Press Release, February 23 2006
-
Federal Trade Commission. Cardsystems Solutions settles FTC charges. FTC Press Release, February 23 2006. http://www.ftc.gov/opa/2006/02/cardsystems_r. htm.
-
Cardsystems Solutions settles FTC charges
-
-
-
9
-
-
84992227458
-
-
D. F Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC), 4(3):224-274, 2001.
-
D. F Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC), 4(3):224-274, 2001.
-
-
-
-
10
-
-
84861290223
-
How to make secure email easier to use
-
Portland, Oregon, April, SIGCHI
-
S. L. Garfinkel, E. Nordlander, R. C. Miller, D. Margrave, and J. I. Schiller. How to make secure email easier to use. In Proceedings of the Conference on Human Factors in Computing Systems (CHI), Portland, Oregon, April 2005. SIGCHI.
-
(2005)
Proceedings of the Conference on Human Factors in Computing Systems (CHI)
-
-
Garfinkel, S.L.1
Nordlander, E.2
Miller, R.C.3
Margrave, D.4
Schiller, J.I.5
-
12
-
-
33745957768
-
Trusted declassification: High-level policy for a security-typed language
-
Ottawa, Canada, June 10, ACM Press
-
B. Hicks, D. King, P. McDaniel, and M. Hicks. Trusted declassification: High-level policy for a security-typed language. In Proceedings of the 1st ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '06), Ottawa, Canada, June 10 2006. ACM Press.
-
(2006)
Proceedings of the 1st ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '06)
-
-
Hicks, B.1
King, D.2
McDaniel, P.3
Hicks, M.4
-
13
-
-
39049085768
-
Breaking Down the Walls of Mutual Distrust: Security-typed Email Using Labeled IPsec
-
Technical Report NAS-TR-0049-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, Sept
-
B. Hicks, S. Rueda, T. Jaeger, and P. McDaniel. Breaking Down the Walls of Mutual Distrust: Security-typed Email Using Labeled IPsec. Technical Report NAS-TR-0049-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, Sept. 2006.
-
(2006)
-
-
Hicks, B.1
Rueda, S.2
Jaeger, T.3
McDaniel, P.4
-
14
-
-
0141528662
-
A unifying approach to the security of distributed and multi-threaded programs
-
H. Mantel and A. Sabelfeld. A unifying approach to the security of distributed and multi-threaded programs. J. Computer Security, 11(4):615-676, 2003.
-
(2003)
J. Computer Security
, vol.11
, Issue.4
, pp. 615-676
-
-
Mantel, H.1
Sabelfeld, A.2
-
15
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
January
-
A. C. Myers. JFlow: Practical mostly-static information flow control. In POPL, pages 228-241, January 1999.
-
(1999)
POPL
, pp. 228-241
-
-
Myers, A.C.1
-
16
-
-
0004001006
-
Mostly-static decentralized information flow control. Technical Report MIT/LCS/TR-783, Massachusetts Institute of Technology, University of Cambridge
-
January, Ph.D. thesis
-
A. C. Myers. Mostly-static decentralized information flow control. Technical Report MIT/LCS/TR-783, Massachusetts Institute of Technology, University of Cambridge, January 1999. Ph.D. thesis.
-
(1999)
-
-
Myers, A.C.1
-
18
-
-
39049108731
-
-
A. C. Myers, N. Nystrom, L. Zheng, and S. Zdancewic. Jif: Java + information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001.
-
A. C. Myers, N. Nystrom, L. Zheng, and S. Zdancewic. Jif: Java + information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001.
-
-
-
-
19
-
-
0036037318
-
Information flow inference for ML
-
January
-
F Pottier and V. Simonet. Information flow inference for ML. In POPL, pages 319-330, January 2002.
-
(2002)
POPL
, pp. 319-330
-
-
Pottier, F.1
Simonet, V.2
-
23
-
-
79955682848
-
Toward automated information-flow integrity verification for security-critical applications
-
The Internet Society
-
U. Shankar, T. Jaeger, and R. Sailer. Toward automated information-flow integrity verification for security-critical applications. In NDSS. The Internet Society, 2006.
-
(2006)
NDSS
-
-
Shankar, U.1
Jaeger, T.2
Sailer, R.3
-
26
-
-
39049129785
-
-
S. Tse and G. Washburn. Cryptographic programming in jif. Project report for CIS-670, Spring 2003, Feb. 11 2004. http://www.cis.upenn.edu/~stse/bank/ main.pdf.
-
S. Tse and G. Washburn. Cryptographic programming in jif. Project report for CIS-670, Spring 2003, Feb. 11 2004. http://www.cis.upenn.edu/~stse/bank/ main.pdf.
-
-
-
-
27
-
-
0033330060
-
Probabilistic noninterference in a concurrent language
-
November
-
D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. JCS, 7(2-3):231-253, November 1999.
-
(1999)
JCS
, vol.7
, Issue.2-3
, pp. 231-253
-
-
Volpano, D.1
Smith, G.2
-
28
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. JCS, 4(3):167-187, 1996.
-
(1996)
JCS
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
29
-
-
4944241703
-
A Type System for Robust Declassification
-
Proceedings of the Nineteenth Conference on the Mathematical Foundations of Programming Semantics, March
-
S. Zdancewic. A Type System for Robust Declassification. In Proceedings of the Nineteenth Conference on the Mathematical Foundations of Programming Semantics. Electronic Notes in Theoretical Computer Science, March 2003.
-
(2003)
Electronic Notes in Theoretical Computer Science
-
-
Zdancewic, S.1
|