-
1
-
-
85084162270
-
-
R. Sailer, X. Zhang, T. Jaeger, L. van Doorn, Design and Implementation of a TCG-based Integrity Measurement Architecture, 13th Usenix Security Symposium, San Diego, California, August 2004
-
R. Sailer, X. Zhang, T. Jaeger, L. van Doorn, Design and Implementation of a TCG-based Integrity Measurement Architecture, 13th Usenix Security Symposium, San Diego, California, August 2004
-
-
-
-
2
-
-
0016949746
-
A lattice model of secure information flow
-
Denning D.E. A lattice model of secure information flow. Communications of the ACM 19 5 (1976) 236-243
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
4
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning D.E., and Denning P.J. Certification of programs for secure information flow. Communications of the ACM 20 7 (1977) 504-513
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
5
-
-
84888352157
-
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazieres, Making information flow explicit in HiStar, Proc. 7th Symposium on Operating Systems Design and Implementation, pp. 263-278, 2006
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazieres, Making information flow explicit in HiStar, Proc. 7th Symposium on Operating Systems Design and Implementation, pp. 263-278, 2006
-
-
-
-
6
-
-
0003801299
-
Inside Java 2 Platform Security: Architecture, API Design, and Implementation
-
Addison-Wesley, Reading, MA, USA
-
Gong L. Inside Java 2 Platform Security: Architecture, API Design, and Implementation. The Java Series (1999), Addison-Wesley, Reading, MA, USA
-
(1999)
The Java Series
-
-
Gong, L.1
-
7
-
-
39149100506
-
-
Kaffe.org (2007). http://www.kaffe.org/
-
(2007)
-
-
Kaffe.org1
-
9
-
-
39149083614
-
-
E. Gluzberg and S. Fink, An Evaluation of Java System Services with Microbenchmarks, IBM Research Report RC 21715 2/3/2000, 2000
-
E. Gluzberg and S. Fink, An Evaluation of Java System Services with Microbenchmarks, IBM Research Report RC 21715 2/3/2000, 2000
-
-
-
-
11
-
-
39149125662
-
-
J.S. Fenton, Information protection systems, PhD. Thesis, University of Cambridge, 1973
-
J.S. Fenton, Information protection systems, PhD. Thesis, University of Cambridge, 1973
-
-
-
-
12
-
-
39149117242
-
-
I. Gat and H.J. Saal, Memoryless execution: a programmer's viewpoint, IBM Tech. Rep. 025, IBM Israeli Scientific Center, 1975
-
I. Gat and H.J. Saal, Memoryless execution: a programmer's viewpoint, IBM Tech. Rep. 025, IBM Israeli Scientific Center, 1975
-
-
-
-
13
-
-
39149097388
-
-
J. Brown and T.F. King Jr, A Minimal Trusted Computing Base for Dynamically Ensuring Secure Information Flow, Tech. Report ARIES-TM-015, MIT, 2001
-
J. Brown and T.F. King Jr, A Minimal Trusted Computing Base for Dynamically Ensuring Secure Information Flow, Tech. Report ARIES-TM-015, MIT, 2001
-
-
-
-
14
-
-
39149135427
-
-
D.E. Denning, Secure information flow in computer systems, Ph.D. Thesis, Purdue U., CSD TR 145, 1975
-
D.E. Denning, Secure information flow in computer systems, Ph.D. Thesis, Purdue U., CSD TR 145, 1975
-
-
-
-
15
-
-
21644475650
-
-
N. Vachharajani, M.J. Bridges, J. Chang, R. Rangan, G. Ottoni, J.A. Blome, G.A. Reis, M. Vachharajani and D.I. August, RIFLE: An Architectural Framework for User-Centric Information-Flow Security, Proceedings of the 37th International Symposium on Microarchitecture, 2004
-
N. Vachharajani, M.J. Bridges, J. Chang, R. Rangan, G. Ottoni, J.A. Blome, G.A. Reis, M. Vachharajani and D.I. August, RIFLE: An Architectural Framework for User-Centric Information-Flow Security, Proceedings of the 37th International Symposium on Microarchitecture, 2004
-
-
-
-
16
-
-
17644378117
-
-
Y. Beres, C.I. Dalton, Dynamic label binding at run-time, Proceedings of the 2003 Workshop on New security paradigms, pp. 39-46, 2003
-
Y. Beres, C.I. Dalton, Dynamic label binding at run-time, Proceedings of the 2003 Workshop on New security paradigms, pp. 39-46, 2003
-
-
-
-
17
-
-
39149095820
-
-
D. Chandra, Information Flow Analysis and Enforcement in Java Bytecode, Ph.D. Thesis, University of California, Irvine, 2006
-
D. Chandra, Information Flow Analysis and Enforcement in Java Bytecode, Ph.D. Thesis, University of California, Irvine, 2006
-
-
-
-
18
-
-
39149100837
-
-
V. Haldar, D. Chandra and M. Franz, Practical, Dynamic Information Flow for Virtual Machines, 2nd International Workshop on Programming Language Interference and Dependence, 2005
-
V. Haldar, D. Chandra and M. Franz, Practical, Dynamic Information Flow for Virtual Machines, 2nd International Workshop on Programming Language Interference and Dependence, 2005
-
-
-
-
19
-
-
39149103267
-
-
U. Erlingsson, The inlined reference monitor approach to security policy enforcement, Ph.D. Thesis, Cornell U., 2004
-
U. Erlingsson, The inlined reference monitor approach to security policy enforcement, Ph.D. Thesis, Cornell U., 2004
-
-
-
-
21
-
-
39149104866
-
-
J. Newsome and D.X. Song, Dynamic Taint Analysis for Automatic Detection, Analysis and Signature Generation of Exploits on Commodity Software, 12th Network and Distributed System Security Symposium, 2005
-
J. Newsome and D.X. Song, Dynamic Taint Analysis for Automatic Detection, Analysis and Signature Generation of Exploits on Commodity Software, 12th Network and Distributed System Security Symposium, 2005
-
-
-
-
22
-
-
0032646625
-
-
A.C. Myers, JFlow: Practical Mostly-Static Information Flow Control, Proceedings of the 26th ACM Symposium on Principles of Programming Languages (POPL), pp. 228-241, San Antonio, Texas, 1999
-
A.C. Myers, JFlow: Practical Mostly-Static Information Flow Control, Proceedings of the 26th ACM Symposium on Principles of Programming Languages (POPL), pp. 228-241, San Antonio, Texas, 1999
-
-
-
|