-
2
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning, D., Denning, P.: Certification of programs for secure information flow. Communications of the ACM 20(7), 504-513 (1977)
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.1
Denning, P.2
-
3
-
-
0030370740
-
A sound type system for secure flow analysis
-
Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. Journal of Computer Security 4(2,3), 167-187 (1996)
-
(1996)
Journal of Computer Security 4(2,3)
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
4
-
-
34547244658
-
Secure information flow with random assignment and encryption
-
Fairfax, Virginia, pp, November
-
Smith, C., Alpízar, R.: Secure information flow with random assignment and encryption. In: Proc. 4th ACM Workshop on Formal Methods in Security Engineering, Fairfax, Virginia, pp. 33-43 (November 2006)
-
(2006)
Proc. 4th ACM Workshop on Formal Methods in Security Engineering
, pp. 33-43
-
-
Smith, C.1
Alpízar, R.2
-
5
-
-
36448950520
-
Fast probabilistic simulation, nontermination, and secure information flow
-
San Diego, California, pp, June
-
Smith, C., Alpízar, R.: Fast probabilistic simulation, nontermination, and secure information flow. In: Proc. 2007 ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, San Diego, California, pp. 67-71 (June 2007)
-
(2007)
Proc. 2007 ACM SIGPLAN Workshop on Programming Languages and Analysis for Security
, pp. 67-71
-
-
Smith, C.1
Alpízar, R.2
-
7
-
-
38349010576
-
Computationally sound typing for non-interference: The case of deterministic encryption
-
Arvind, V, Prasad, S, eds, FSTTCS 2007, Springer. Heidelberg
-
Courant, J., Ene, C., Lakhnech, Y.: Computationally sound typing for non-interference: The case of deterministic encryption. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol. 4855, pp. 364-375. Springer. Heidelberg (2007)
-
(2007)
LNCS
, vol.4855
, pp. 364-375
-
-
Courant, J.1
Ene, C.2
Lakhnech, Y.3
-
8
-
-
84945249768
-
-
Laud, P.: Semantics and program analysis of computationally secure information flow. In: Sands, D. (ed.) ESOP 2001. LNCS, 2028, pp. 77-91. Springer, Heidelberg (2001)
-
Laud, P.: Semantics and program analysis of computationally secure information flow. In: Sands, D. (ed.) ESOP 2001. LNCS, vol. 2028, pp. 77-91. Springer, Heidelberg (2001)
-
-
-
-
9
-
-
35248840989
-
-
Laud. P.: Handling encryption in an analysis for secure information flow. In: Degano, P. (ed.) ESOP 2003. LNCS, 2618, pp. 159-173. Springer, Heidelberg (2003)
-
Laud. P.: Handling encryption in an analysis for secure information flow. In: Degano, P. (ed.) ESOP 2003. LNCS, vol. 2618, pp. 159-173. Springer, Heidelberg (2003)
-
-
-
-
10
-
-
26844509701
-
-
Laud. P., Vene, V.: A type system for computationally secure information flow. In: Liśkiewicz, M., Reischuk, R. (eds.) FCT 2005. LNCS, 3623, pp. 365-377. Springer, Heidelberg (2005)
-
Laud. P., Vene, V.: A type system for computationally secure information flow. In: Liśkiewicz, M., Reischuk, R. (eds.) FCT 2005. LNCS, vol. 3623, pp. 365-377. Springer, Heidelberg (2005)
-
-
-
-
11
-
-
33749846305
-
Cryptographically-masked flows
-
Seoul. Korea, pp
-
Askarov, A., Hedin, D., Sabelfeld, A.: Cryptographically-masked flows. In: Proceedings of the 13th International Static Analysis Symposium, Seoul. Korea, pp. 353-369 (2006)
-
(2006)
Proceedings of the 13th International Static Analysis Symposium
, pp. 353-369
-
-
Askarov, A.1
Hedin, D.2
Sabelfeld, A.3
-
12
-
-
84865660260
-
On the computational soundness of cryptographically masked flows
-
San Francisco, California January
-
Laud, P.: On the computational soundness of cryptographically masked flows. In: Proceedings 35th Symposium on Principles of Programming Languages, San Francisco, California (January 2008)
-
(2008)
Proceedings 35th Symposium on Principles of Programming Languages
-
-
Laud, P.1
-
13
-
-
34548790762
-
A cryptographic decentralized label model
-
Oakland, California, pp
-
Vaughan, J., Zdancewic, S.: A cryptographic decentralized label model. In: IEEE Symposium on Security and Privacy, Oakland, California, pp. 192-206 (2007)
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 192-206
-
-
Vaughan, J.1
Zdancewic, S.2
-
17
-
-
0003421261
-
-
3rd edn, John Wiley & Sons, Inc, Chichester
-
Feller, W.: An Introduction to Probability Theory and Its Applications, 3rd edn., vol. I. John Wiley & Sons, Inc., Chichester (1968)
-
(1968)
An Introduction to Probability Theory and Its Applications
, vol.1
-
-
Feller, W.1
-
18
-
-
0033700286
-
Probabilistic noninterference for multi-threaded programs
-
Cambridge, UK, pp, July
-
Sabelfeld, A., Sands, D.: Probabilistic noninterference for multi-threaded programs. In: Proceedings 13th IEEE Computer Security Foundations Workshop, Cambridge, UK, pp. 200-214 (July 2000)
-
(2000)
Proceedings 13th IEEE Computer Security Foundations Workshop
, pp. 200-214
-
-
Sabelfeld, A.1
Sands, D.2
-
20
-
-
21244460040
-
Comparative branching-time semantics for Markov chains
-
Baier, C., Katoen, J.-P., Hermanns, H., Wolf, V.: Comparative branching-time semantics for Markov chains. Information and Computation 200(2), 149-214 (2005)
-
(2005)
Information and Computation
, vol.200
, Issue.2
, pp. 149-214
-
-
Baier, C.1
Katoen, J.-P.2
Hermanns, H.3
Wolf, V.4
-
21
-
-
84948746951
-
Approximate non-interference
-
Nova, Scotia, Canada, pp, June
-
Di Pierro, A., Hankin, C., Wiklicky, H.: Approximate non-interference. In: Proceedings 15th IEEE Computer Security Foundations Workshop, Cape Breton, Nova, Scotia, Canada, pp. 1-17 (June 2002)
-
(2002)
Proceedings 15th IEEE Computer Security Foundations Workshop, Cape Breton
, pp. 1-17
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
22
-
-
0345275464
-
Quantitative analysis of the leakage of confidential data
-
Clark, D., Hunt, S., Malacaria, P.: Quantitative analysis of the leakage of confidential data. Electronic Notes in Theoretical Computer Science 59(3) (2002)
-
(2002)
Electronic Notes in Theoretical Computer Science
, vol.59
, Issue.3
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
23
-
-
20844445346
-
Quantitative information flow, relations and polymorphic types
-
Clark, D., Hunt, S., Malacaria, P.: Quantitative information flow, relations and polymorphic types. Journal of Logic and Computation 18(2), 181-199 (2005)
-
(2005)
Journal of Logic and Computation
, vol.18
, Issue.2
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
26
-
-
28144442041
-
Belief in information flow
-
Aix-en-Provence, France, pp, June
-
Clarkson, M., Myers, A., Schneider, F.: Belief in information flow. In: Proceedings 18th IEEE Computer Security Foundations Workshop, Aix-en-Provence, France, pp. 31-45 (June 2005)
-
(2005)
Proceedings 18th IEEE Computer Security Foundations Workshop
, pp. 31-45
-
-
Clarkson, M.1
Myers, A.2
Schneider, F.3
-
27
-
-
84948775168
-
Quantifying information flow
-
Nova Scotia, Canada, pp, June
-
Lowe, G.: Quantifying information flow. In: Proceedings 15th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, pp. 18-31 (June 2002)
-
(2002)
Proceedings 15th IEEE Computer Security Foundations Workshop, Cape Breton
, pp. 18-31
-
-
Lowe, G.1
|