메뉴 건너뛰기




Volumn , Issue , 2006, Pages 153-164

From languages to systems: Understanding practical application development in security-typed languages

Author keywords

[No Author keywords available]

Indexed keywords

POLICY TOOLS; REAL-WORLD POLICIES; SECURITY-TYPED LANGUAGES;

EID: 39049162501     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2006.30     Document Type: Conference Paper
Times cited : (28)

References (29)
  • 1
    • 36448959172 scopus 로고    scopus 로고
    • Secure implementation of cryptographic protocols: A case study of mutual distrust
    • Proceedings of the 10th European Symposium on Research in Computer Security ESORICS '05, Milan, Italy, September, Springer-Verlag
    • A. Askarov and A. Sabelfeld. Secure implementation of cryptographic protocols: A case study of mutual distrust. In Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS '05), LNCS, Milan, Italy, September 2005. Springer-Verlag.
    • (2005) LNCS
    • Askarov, A.1    Sabelfeld, A.2
  • 3
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • Technical Report MTR-2547, 1, MITRE Corp, Bedford, MA
    • D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations. Technical Report MTR-2547, Vol. 1, MITRE Corp., Bedford, MA, 1973.
    • (1973)
    • Bell, D.E.1    LaPadula, L.J.2
  • 8
    • 39049113405 scopus 로고    scopus 로고
    • FTC Press Release, February 23 2006
    • Federal Trade Commission. Cardsystems Solutions settles FTC charges. FTC Press Release, February 23 2006. http://www.ftc.gov/opa/2006/02/cardsystems_r. htm.
    • Cardsystems Solutions settles FTC charges
  • 9
    • 84992227458 scopus 로고    scopus 로고
    • D. F Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC), 4(3):224-274, 2001.
    • D. F Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC), 4(3):224-274, 2001.
  • 13
    • 39049085768 scopus 로고    scopus 로고
    • Breaking Down the Walls of Mutual Distrust: Security-typed Email Using Labeled IPsec
    • Technical Report NAS-TR-0049-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, Sept
    • B. Hicks, S. Rueda, T. Jaeger, and P. McDaniel. Breaking Down the Walls of Mutual Distrust: Security-typed Email Using Labeled IPsec. Technical Report NAS-TR-0049-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, Sept. 2006.
    • (2006)
    • Hicks, B.1    Rueda, S.2    Jaeger, T.3    McDaniel, P.4
  • 14
    • 0141528662 scopus 로고    scopus 로고
    • A unifying approach to the security of distributed and multi-threaded programs
    • H. Mantel and A. Sabelfeld. A unifying approach to the security of distributed and multi-threaded programs. J. Computer Security, 11(4):615-676, 2003.
    • (2003) J. Computer Security , vol.11 , Issue.4 , pp. 615-676
    • Mantel, H.1    Sabelfeld, A.2
  • 15
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • January
    • A. C. Myers. JFlow: Practical mostly-static information flow control. In POPL, pages 228-241, January 1999.
    • (1999) POPL , pp. 228-241
    • Myers, A.C.1
  • 16
    • 0004001006 scopus 로고    scopus 로고
    • Mostly-static decentralized information flow control. Technical Report MIT/LCS/TR-783, Massachusetts Institute of Technology, University of Cambridge
    • January, Ph.D. thesis
    • A. C. Myers. Mostly-static decentralized information flow control. Technical Report MIT/LCS/TR-783, Massachusetts Institute of Technology, University of Cambridge, January 1999. Ph.D. thesis.
    • (1999)
    • Myers, A.C.1
  • 18
    • 39049108731 scopus 로고    scopus 로고
    • A. C. Myers, N. Nystrom, L. Zheng, and S. Zdancewic. Jif: Java + information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001.
    • A. C. Myers, N. Nystrom, L. Zheng, and S. Zdancewic. Jif: Java + information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001.
  • 19
    • 0036037318 scopus 로고    scopus 로고
    • Information flow inference for ML
    • January
    • F Pottier and V. Simonet. Information flow inference for ML. In POPL, pages 319-330, January 2002.
    • (2002) POPL , pp. 319-330
    • Pottier, F.1    Simonet, V.2
  • 23
    • 79955682848 scopus 로고    scopus 로고
    • Toward automated information-flow integrity verification for security-critical applications
    • The Internet Society
    • U. Shankar, T. Jaeger, and R. Sailer. Toward automated information-flow integrity verification for security-critical applications. In NDSS. The Internet Society, 2006.
    • (2006) NDSS
    • Shankar, U.1    Jaeger, T.2    Sailer, R.3
  • 26
    • 39049129785 scopus 로고    scopus 로고
    • S. Tse and G. Washburn. Cryptographic programming in jif. Project report for CIS-670, Spring 2003, Feb. 11 2004. http://www.cis.upenn.edu/~stse/bank/ main.pdf.
    • S. Tse and G. Washburn. Cryptographic programming in jif. Project report for CIS-670, Spring 2003, Feb. 11 2004. http://www.cis.upenn.edu/~stse/bank/ main.pdf.
  • 27
    • 0033330060 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language
    • November
    • D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. JCS, 7(2-3):231-253, November 1999.
    • (1999) JCS , vol.7 , Issue.2-3 , pp. 231-253
    • Volpano, D.1    Smith, G.2
  • 28
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. JCS, 4(3):167-187, 1996.
    • (1996) JCS , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 29
    • 4944241703 scopus 로고    scopus 로고
    • A Type System for Robust Declassification
    • Proceedings of the Nineteenth Conference on the Mathematical Foundations of Programming Semantics, March
    • S. Zdancewic. A Type System for Robust Declassification. In Proceedings of the Nineteenth Conference on the Mathematical Foundations of Programming Semantics. Electronic Notes in Theoretical Computer Science, March 2003.
    • (2003) Electronic Notes in Theoretical Computer Science
    • Zdancewic, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.