메뉴 건너뛰기




Volumn , Issue , 2007, Pages 463-474

Fine-grained information flow analysis and enforcement in a Java virtual machine

Author keywords

[No Author keywords available]

Indexed keywords

BENCHMARKING; COMPUTER PROGRAMMING LANGUAGES; KETONES; SECURITY SYSTEMS; STATIC ANALYSIS;

EID: 48649085342     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2007.37     Document Type: Conference Paper
Times cited : (70)

References (39)
  • 7
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • 2547 v2, MITRE, November
    • D. Bell and L. LaPadula. Secure computer systems: mathematical foundations. Report MTR 2547 v2, MITRE, November 1973.
    • (1973) Report MTR
    • Bell, D.1    LaPadula, L.2
  • 8
    • 0036389413 scopus 로고    scopus 로고
    • C. Bernardeschi, N. D. Francesco, and G. Lettieri. Using standard verifier to check secure information flow in java bytecode. In COMPSAC '02: Proceedings of the 26th International Computer Software and Applications Conference, pages 850-855, 2002
    • C. Bernardeschi, N. D. Francesco, and G. Lettieri. Using standard verifier to check secure information flow in java bytecode. In COMPSAC '02: Proceedings of the 26th International Computer Software and Applications Conference, pages 850-855, 2002.
  • 12
    • 48649103664 scopus 로고    scopus 로고
    • K. Cooper, T. Harvey, and K. Kennedy. A simple, fast dominance algorithm. Available at http://www.cs.rice.edu/ keith/embed., 2001.
    • K. Cooper, T. Harvey, and K. Kennedy. A simple, fast dominance algorithm. Available at http://www.cs.rice.edu/ keith/embed., 2001.
  • 13
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 14
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 16
    • 0033489650 scopus 로고    scopus 로고
    • Ú. Erlingsson and F. B. Schneider. SASI Enforcement of Security Policies: A Retrospective. In New Security Paradigms Workshop, pages 87-95, Ontario, Canada, 22-24 1999. ACM SIGSAC, ACM Press.
    • Ú. Erlingsson and F. B. Schneider. SASI Enforcement of Security Policies: A Retrospective. In New Security Paradigms Workshop, pages 87-95, Ontario, Canada, 22-24 1999. ACM SIGSAC, ACM Press.
  • 18
    • 0036147522 scopus 로고    scopus 로고
    • Improving security using extensible lightweight static analysis
    • Jan/Feb
    • D. Evans and D. Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, Jan/Feb, 2002.
    • (2002) IEEE Software
    • Evans, D.1    Larochelle, D.2
  • 25
    • 35348876468 scopus 로고
    • Computer with virtual machine mode and multiple protection rings,
    • U.S. Patent No. 4787031, November
    • P. A. Karger, T. E. Leonard, and A. H. Mason. Computer with virtual machine mode and multiple protection rings, U.S. Patent No. 4787031, November 1988.
    • (1988)
    • Karger, P.A.1    Leonard, T.E.2    Mason, A.H.3
  • 26
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B. W. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, 1973.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 27
    • 0016951438 scopus 로고
    • Security kernel validation in practice
    • J. K. Millen. Security kernel validation in practice. Communications of the ACM, 19(5):243-250, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 243-250
    • Millen, J.K.1
  • 29
    • 0000046942 scopus 로고
    • A security flow control algorithm and its denotational semantics correctness proof
    • M. Mizuno and D. A. Schmidt. A security flow control algorithm and its denotational semantics correctness proof. Formal Aspects of Computing, 4(6A):727-754, 1992.
    • (1992) Formal Aspects of Computing , vol.4 , Issue.6 A , pp. 727-754
    • Mizuno, M.1    Schmidt, D.A.2
  • 31
    • 0004001006 scopus 로고    scopus 로고
    • PhD thesis, Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science
    • A. C. Myers. Mostly-static decentralized information flow control. PhD thesis, Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1999.
    • (1999) Mostly-static decentralized information flow control
    • Myers, A.C.1
  • 32
    • 48649105822 scopus 로고
    • Secure multilevel virtual computer systems
    • Technical Report ESD-TR-74-370, MITRE Corp, Bedford, Massachussetts
    • R. Rhode. Secure multilevel virtual computer systems. Technical Report ESD-TR-74-370, MITRE Corp., Bedford, Massachussetts, 1975.
    • (1975)
    • Rhode, R.1
  • 39
    • 0016649031 scopus 로고
    • Secure computer operation with virtual machine partitioning
    • Anaheim, California
    • C. Weissman. Secure computer operation with virtual machine partitioning. In National Computer Conference, May 19-22, 1975, Anaheim, California, pages 929-934, 1975.
    • (1975) National Computer Conference, May 19-22, 1975 , pp. 929-934
    • Weissman, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.