-
1
-
-
33745806932
-
A logic for information flow in object-oriented programs
-
Amtoft, T., Bandhakavi, S., Banerjee, A.: A logic for information flow in object-oriented programs. In: 33rd Principles of Programming Languages (POPL), pp. 91-102 (2006)
-
(2006)
33rd Principles of Programming Languages (POPL)
, pp. 91-102
-
-
Amtoft, T.1
Bandhakavi, S.2
Banerjee, A.3
-
2
-
-
35048839749
-
-
Amtoft, T., Banerjee, A.: Information Flow Analysis in Logical Form. In: Giacobazzi, R. (ed.) SAS 2004. LNCS, 3148, pp. 100-115. Springer, Heidelberg (2004)
-
Amtoft, T., Banerjee, A.: Information Flow Analysis in Logical Form. In: Giacobazzi, R. (ed.) SAS 2004. LNCS, vol. 3148, pp. 100-115. Springer, Heidelberg (2004)
-
-
-
-
3
-
-
33751073715
-
-
Amtoft, T., Banerjee, A.: A logic for information flow analysis with an application to forward slicing of simple imperative programs. Science of Comp. Prog. 64(1), 3-28 (2007)
-
Amtoft, T., Banerjee, A.: A logic for information flow analysis with an application to forward slicing of simple imperative programs. Science of Comp. Prog. 64(1), 3-28 (2007)
-
-
-
-
4
-
-
58049149107
-
-
Amtoft, T., Banerjee, A.: Verification condition generation for conditional information flow. In: 5th ACM Workshop on Formal Methods in Security Engineering (FMSE), pp. 2-11 (2007); A long version, with proofs, appears as technical report KSU CIS TR 2007-2
-
Amtoft, T., Banerjee, A.: Verification condition generation for conditional information flow. In: 5th ACM Workshop on Formal Methods in Security Engineering (FMSE), pp. 2-11 (2007); A long version, with proofs, appears as technical report KSU CIS TR 2007-2
-
-
-
-
5
-
-
47249131553
-
-
Amtoft, T., Hatcliff, J., Rodriguez, E., Robby, Hoag, J., Greve, D.: Specification and checking of software contracts for conditional information flow (extended version). Technical Report SAnToS-TR2007-5, KSU CIS (2007), http://www.sireum.org
-
Amtoft, T., Hatcliff, J., Rodriguez, E., Robby, Hoag, J., Greve, D.: Specification and checking of software contracts for conditional information flow (extended version). Technical Report SAnToS-TR2007-5, KSU CIS (2007), http://www.sireum.org
-
-
-
-
6
-
-
17044429386
-
Stack-based access control and secure information flow
-
Banerjee, A., Naumann, D.A.: Stack-based access control and secure information flow. Journal of Functional Programming 2(15), 131-177 (2005)
-
(2005)
Journal of Functional Programming
, vol.2
, Issue.15
, pp. 131-177
-
-
Banerjee, A.1
Naumann, D.A.2
-
8
-
-
4944265699
-
-
Foccardi, R, ed, IEEE Press, Los Alamitos
-
Barthe, G., D'Argenio, P., Rezk, T.: Secure information flow by self-composition. In: Foccardi, R. (ed.) CSFW 2004, pp. 100-114. IEEE Press, Los Alamitos (2004)
-
(2004)
Secure information flow by self-composition
, vol.CSFW 2004
, pp. 100-114
-
-
Barthe, G.1
D'Argenio, P.2
Rezk, T.3
-
9
-
-
84976850518
-
Information-flow and data-flow analysis of while-programs
-
Bergeretti, J.-F., Carré, B.A.: Information-flow and data-flow analysis of while-programs. ACM TOPLAS 7(1), 37-61 (1985)
-
(1985)
ACM TOPLAS
, vol.7
, Issue.1
, pp. 37-61
-
-
Bergeretti, J.-F.1
Carré, B.A.2
-
10
-
-
19544375598
-
-
Chapman, R., Hilton, A.: Enforcing security and safety models with an information flow analysis tool. In: SIGAda 2004, Atlanta, Georgia, November 2004, pp. 39-46. ACM, New York (2004)
-
Chapman, R., Hilton, A.: Enforcing security and safety models with an information flow analysis tool. In: SIGAda 2004, Atlanta, Georgia, November 2004, pp. 39-46. ACM, New York (2004)
-
-
-
-
11
-
-
24644445710
-
-
Darvas, A., Hähnle, R., Sands, D.: A theorem proving approach to analysis of secure information flow. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, 3450, pp. 193-209. Springer, Heidelberg (2005)
-
Darvas, A., Hähnle, R., Sands, D.: A theorem proving approach to analysis of secure information flow. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 193-209. Springer, Heidelberg (2005)
-
-
-
-
14
-
-
34547321335
-
Formal specification and verification of data separation in a separation kernel for an embedded system
-
Heitmeyer, C.L., Archer, M., Leonard, E.I., McLean, J.: Formal specification and verification of data separation in a separation kernel for an embedded system. In: 13th ACM Conference on Computer and Communications Security (CCS 2006), pp. 346-355 (2006)
-
(2006)
13th ACM Conference on Computer and Communications Security (CCS
, pp. 346-355
-
-
Heitmeyer, C.L.1
Archer, M.2
Leonard, E.I.3
McLean, J.4
-
15
-
-
84991042142
-
-
Jackson, D, Thomas, M, Millett, L.I, eds, National Academies Press, Washington , Committee on Certifiably Dependable Software Systems, National Research Council
-
Jackson, D., Thomas, M., Millett, L.I. (eds.): Software for Dependable Systems: Sufficient Evidence? National Academies Press, Washington (2007); Committee on Certifiably Dependable Software Systems, National Research Council
-
(2007)
Software for Dependable Systems: Sufficient Evidence
-
-
-
16
-
-
0003685445
-
-
Kluwer Academic Publishers, Dordrecht
-
Kaufmann, M., Manolios, P., Moore, J.S.: Computer-Aided Reasoning: An Approach. Kluwer Academic Publishers, Dordrecht (2000)
-
(2000)
Computer-Aided Reasoning: An Approach
-
-
Kaufmann, M.1
Manolios, P.2
Moore, J.S.3
-
17
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
San Antonio, Texas, pp, ACM Press, New York
-
Myers, A.C.: JFlow: Practical mostly-static information flow control. In: POPL 1999, San Antonio, Texas, pp. 228-241. ACM Press, New York (1999)
-
(1999)
POPL
, pp. 228-241
-
-
Myers, A.C.1
-
18
-
-
33750232981
-
From Coupling Relations to Mated Invariants for Checking Information Flow
-
Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
-
Naumann, J.D.A.: From Coupling Relations to Mated Invariants for Checking Information Flow. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 279-296. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4189
, pp. 279-296
-
-
Naumann, J.D.A.1
-
19
-
-
84944677742
-
-
Owre, S., Rushby, J.M., Shankar, N.: PVS: A prototype verification system. In: Kapur, D. (ed.) CADE 1992. LNCS, 607, Springer, Heidelberg (1992)
-
Owre, S., Rushby, J.M., Shankar, N.: PVS: A prototype verification system. In: Kapur, D. (ed.) CADE 1992. LNCS, vol. 607, Springer, Heidelberg (1992)
-
-
-
-
20
-
-
47249145088
-
Using SPARK-Ada to model and verify a MILS message router
-
Rossebo, B., Oman, P., Alves-Foss, J., Blue, R., Jaszkowiak, P.: Using SPARK-Ada to model and verify a MILS message router. In: Proceedings of the International Symposium on Secure Software Engineering (2006)
-
(2006)
Proceedings of the International Symposium on Secure Software Engineering
-
-
Rossebo, B.1
Oman, P.2
Alves-Foss, J.3
Blue, R.4
Jaszkowiak, P.5
-
21
-
-
85041481084
-
-
Rushby, J.: The design and verification of secure systems. In: 8th ACM Symposium on Operating Systems Principles, 15(5), pp. 12-21 (1981)
-
Rushby, J.: The design and verification of secure systems. In: 8th ACM Symposium on Operating Systems Principles, vol. 15(5), pp. 12-21 (1981)
-
-
-
-
22
-
-
47249103755
-
-
Simonet, V.: Flow Caml in a nutshell. In: Hutton, G. (ed.) First APPSEM-II workshop, March 2003, pp. 152-165 (2003)
-
Simonet, V.: Flow Caml in a nutshell. In: Hutton, G. (ed.) First APPSEM-II workshop, March 2003, pp. 152-165 (2003)
-
-
-
-
23
-
-
33750912954
-
Efficient path conditions in dependence graphs for software safety analysis
-
Snelting, G., Robschink, T., Krinke, J.: Efficient path conditions in dependence graphs for software safety analysis. ACM TOSEM 15(4), 410-457 (2006)
-
(2006)
ACM TOSEM
, vol.15
, Issue.4
, pp. 410-457
-
-
Snelting, G.1
Robschink, T.2
Krinke, J.3
-
24
-
-
33646037706
-
-
Terauchi, T., Aiken, A.: Secure information flow as a safety problem. In: Hankin, C., Siveroni, I. (eds.) SAS 2005. LNCS, 3672, pp. 352-367. Springer, Heidelberg (2005)
-
Terauchi, T., Aiken, A.: Secure information flow as a safety problem. In: Hankin, C., Siveroni, I. (eds.) SAS 2005. LNCS, vol. 3672, pp. 352-367. Springer, Heidelberg (2005)
-
-
-
-
25
-
-
23844466980
-
MILS: Architecture for high-assurance embedded computing
-
August
-
Vanfleet, M., Luke, J., Beckwith, R.W., Taylor, C., Calloni, B., Uchenick, G.: MILS: Architecture for high-assurance embedded computing. CrossTalk: The Journal of Defense Software Engineering (August 2005)
-
(2005)
CrossTalk: The Journal of Defense Software Engineering
-
-
Vanfleet, M.1
Luke, J.2
Beckwith, R.W.3
Taylor, C.4
Calloni, B.5
Uchenick, G.6
-
26
-
-
0030370740
-
A sound type system for secure flow analysis
-
Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. Journal of Computer Security 4(3), 167-188 (1996)
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-188
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|