-
1
-
-
0032681509
-
A core calculus of dependency
-
M. Abadi, A. Banerjee, N. Heintze, and J. G. Riecke. A core calculus of dependency. In POPL '99: Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 147-160, 1999.
-
(1999)
POPL '99: Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
7
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
2547 v2, MITRE, November
-
D. Bell and L. LaPadula. Secure computer systems: mathematical foundations. Report MTR 2547 v2, MITRE, November 1973.
-
(1973)
Report MTR
-
-
Bell, D.1
LaPadula, L.2
-
8
-
-
0036389413
-
-
C. Bernardeschi, N. D. Francesco, and G. Lettieri. Using standard verifier to check secure information flow in java bytecode. In COMPSAC '02: Proceedings of the 26th International Computer Software and Applications Conference, pages 850-855, 2002
-
C. Bernardeschi, N. D. Francesco, and G. Lettieri. Using standard verifier to check secure information flow in java bytecode. In COMPSAC '02: Proceedings of the 26th International Computer Software and Applications Conference, pages 850-855, 2002.
-
-
-
-
9
-
-
84937553676
-
Static analysis for secrecy and non-interference in networks of processes
-
C. Bodei, P. Degano, F. Nielson, and H. R. Nielson. Static analysis for secrecy and non-interference in networks of processes. In PACT '01: Proceedings of the 6th International Conference on Parallel Computing Technologies, pages 27-41, 2001.
-
(2001)
PACT '01: Proceedings of the 6th International Conference on Parallel Computing Technologies
, pp. 27-41
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
10
-
-
0035838828
-
Static analysis for the π-calculus with applications to security
-
C. Bodei, P. Degano, F. Nielson, and H. Riis Nielson. Static analysis for the π-calculus with applications to security. Information and Computation, 168:68-92, 2001.
-
(2001)
Information and Computation
, vol.168
, pp. 68-92
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Riis Nielson, H.4
-
11
-
-
0345673633
-
Benchmarking Java Grande applications
-
April
-
J. Bull, L. Smith, M. Westhead, D. Henty, and R. Davey. Benchmarking Java Grande applications. In Proceedings of the Second International Conference on The Practical Applications of Java, pages 63-73, April 2000.
-
(2000)
Proceedings of the Second International Conference on The Practical Applications of Java
, pp. 63-73
-
-
Bull, J.1
Smith, L.2
Westhead, M.3
Henty, D.4
Davey, R.5
-
12
-
-
48649103664
-
-
K. Cooper, T. Harvey, and K. Kennedy. A simple, fast dominance algorithm. Available at http://www.cs.rice.edu/ keith/embed., 2001.
-
K. Cooper, T. Harvey, and K. Kennedy. A simple, fast dominance algorithm. Available at http://www.cs.rice.edu/ keith/embed., 2001.
-
-
-
-
13
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
14
-
-
0017517624
-
Certification of programs for secure information flow
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
16
-
-
0033489650
-
-
Ú. Erlingsson and F. B. Schneider. SASI Enforcement of Security Policies: A Retrospective. In New Security Paradigms Workshop, pages 87-95, Ontario, Canada, 22-24 1999. ACM SIGSAC, ACM Press.
-
Ú. Erlingsson and F. B. Schneider. SASI Enforcement of Security Policies: A Retrospective. In New Security Paradigms Workshop, pages 87-95, Ontario, Canada, 22-24 1999. ACM SIGSAC, ACM Press.
-
-
-
-
18
-
-
0036147522
-
Improving security using extensible lightweight static analysis
-
Jan/Feb
-
D. Evans and D. Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, Jan/Feb, 2002.
-
(2002)
IEEE Software
-
-
Evans, D.1
Larochelle, D.2
-
24
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing web application code by static analysis and runtime protection. In WWW '04: Proceedings of the 13th international World Wide Web conference, pages 40-52, 2004.
-
(2004)
WWW '04: Proceedings of the 13th international World Wide Web conference
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
25
-
-
35348876468
-
Computer with virtual machine mode and multiple protection rings,
-
U.S. Patent No. 4787031, November
-
P. A. Karger, T. E. Leonard, and A. H. Mason. Computer with virtual machine mode and multiple protection rings, U.S. Patent No. 4787031, November 1988.
-
(1988)
-
-
Karger, P.A.1
Leonard, T.E.2
Mason, A.H.3
-
26
-
-
0015672289
-
A note on the confinement problem
-
B. W. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
27
-
-
0016951438
-
Security kernel validation in practice
-
J. K. Millen. Security kernel validation in practice. Communications of the ACM, 19(5):243-250, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 243-250
-
-
Millen, J.K.1
-
29
-
-
0000046942
-
A security flow control algorithm and its denotational semantics correctness proof
-
M. Mizuno and D. A. Schmidt. A security flow control algorithm and its denotational semantics correctness proof. Formal Aspects of Computing, 4(6A):727-754, 1992.
-
(1992)
Formal Aspects of Computing
, vol.4
, Issue.6 A
, pp. 727-754
-
-
Mizuno, M.1
Schmidt, D.A.2
-
31
-
-
0004001006
-
-
PhD thesis, Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science
-
A. C. Myers. Mostly-static decentralized information flow control. PhD thesis, Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1999.
-
(1999)
Mostly-static decentralized information flow control
-
-
Myers, A.C.1
-
32
-
-
48649105822
-
Secure multilevel virtual computer systems
-
Technical Report ESD-TR-74-370, MITRE Corp, Bedford, Massachussetts
-
R. Rhode. Secure multilevel virtual computer systems. Technical Report ESD-TR-74-370, MITRE Corp., Bedford, Massachussetts, 1975.
-
(1975)
-
-
Rhode, R.1
-
34
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In 10th USENIX Security Symposium, pages 201-220, 2001.
-
(2001)
10th USENIX Security Symposium
, pp. 201-220
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
35
-
-
21644475650
-
Rifle: An architectural framework for user-centric information-flow security
-
December
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. Rifle: An architectural framework for user-centric information-flow security. In 37th International Symposium on Microarchitecture, December 2004.
-
(2004)
37th International Symposium on Microarchitecture
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
36
-
-
0001956132
-
Soot - a Java bytecode optimization framework
-
R. Vallee-Rai, L. Hendren, V. Sundaresan, P. Lam, E. Gagnon, and P. Co. Soot - a Java bytecode optimization framework. In CASCON '99: Proceedings of the 1999 IBM Center for Advanced Studies Conference on Collaborative research, pages 125-135, 1999.
-
(1999)
CASCON '99: Proceedings of the 1999 IBM Center for Advanced Studies Conference on Collaborative research
, pp. 125-135
-
-
Vallee-Rai, R.1
Hendren, L.2
Sundaresan, V.3
Lam, P.4
Gagnon, E.5
Co, P.6
-
37
-
-
0030673701
-
Eliminating covert flows with minimum typings
-
Washington, DC, USA, IEEE Computer Society
-
D. Volpano and G. Smith. Eliminating covert flows with minimum typings. In CSFW '97: Proceedings of the 10th IEEE Computer Security Foundations Workshop, page 156, Washington, DC, USA, 1997. IEEE Computer Society.
-
(1997)
CSFW '97: Proceedings of the 10th IEEE Computer Security Foundations Workshop
, pp. 156
-
-
Volpano, D.1
Smith, G.2
-
38
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
39
-
-
0016649031
-
Secure computer operation with virtual machine partitioning
-
Anaheim, California
-
C. Weissman. Secure computer operation with virtual machine partitioning. In National Computer Conference, May 19-22, 1975, Anaheim, California, pages 929-934, 1975.
-
(1975)
National Computer Conference, May 19-22, 1975
, pp. 929-934
-
-
Weissman, C.1
|