-
2
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
8
-
-
0031176779
-
Closure properties of constraints
-
P. Jeavons, D. Cohen, and M. Gyssens. Closure properties of constraints. Journal of the ACM, 44(4):527-548, 1997.
-
(1997)
Journal of the ACM
, vol.44
, Issue.4
, pp. 527-548
-
-
Jeavons, P.1
Cohen, D.2
Gyssens, M.3
-
9
-
-
0039015629
-
Authentication in distributed systems: Theory and practice
-
October
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. In Proc. 13th ACM Symp. on Operating System Principles (SOSP), pages 165-182, October 1991. Operating System Review, 253(5).
-
(1991)
Proc. 13th ACM Symp. on Operating System Principles (SOSP)
, pp. 165-182
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
10
-
-
0039015629
-
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. In Proc. 13th ACM Symp. on Operating System Principles (SOSP), pages 165-182, October 1991. Operating System Review, 253(5).
-
Operating System Review
, vol.253
, Issue.5
-
-
-
15
-
-
0004001006
-
Mostly-static decentralized information flow control
-
MIT, Cambridge, MA, January. Ph.D. thesis
-
A. C. Myers. Mostly-static decentralized information flow control. Technical Report MIT/LCS/TR-783, MIT, Cambridge, MA, January 1999. Ph.D. thesis.
-
(1999)
Technical Report
, vol.MIT-LCS-TR-783
-
-
Myers, A.C.1
-
17
-
-
0031682833
-
Complete, safe information flow with decentralized labels
-
Oakland, CA, USA, May
-
A. C. Myers and B. Liskov. Complete, safe information flow with decentralized labels. In Proc. IEEE Symposium on Security and Privacy, pages 186-197, Oakland, CA, USA, May 1998.
-
(1998)
Proc. IEEE Symposium on Security and Privacy
, pp. 186-197
-
-
Myers, A.C.1
Liskov, B.2
-
22
-
-
0003502331
-
Noninterference, transitivity and channel-control security policies
-
SRI
-
J. Rushby. Noninterference, transitivity and channel-control security policies. Technical report, SRI, 1992.
-
(1992)
Technical Report
-
-
Rushby, J.1
-
24
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
26
-
-
0034822370
-
Robust declassification
-
Cape Breton, Nova Scotia, Canada, June
-
S. Zdancewic and A. C. Myers. Robust declassification. In Proc. 14th IEEE Computer Security Foundations Workshop, pages 15-23, Cape Breton, Nova Scotia, Canada, June 2001.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop
, pp. 15-23
-
-
Zdancewic, S.1
Myers, A.C.2
-
27
-
-
33745193613
-
Dynamic security labels and noninterference
-
Cornell University Computing and Information Science
-
L. Zheng and A. C. Myers. Dynamic security labels and noninterference. Technical Report 2004-1924, Cornell University Computing and Information Science, 2004.
-
(2004)
Technical Report
, vol.2004
, Issue.1924
-
-
Zheng, L.1
Myers, A.C.2
|