-
2
-
-
84976675687
-
Information Transmission in Computational Systems
-
Cohen, E.S.: Information Transmission in Computational Systems. ACM SIGOPS Operating Systems Review 11(5), 133-139 (1977)
-
(1977)
ACM SIGOPS Operating Systems Review
, vol.11
, Issue.5
, pp. 133-139
-
-
Cohen, E.S.1
-
4
-
-
17044429386
-
Stack-based Access Control and Secure Information Flow
-
Banerjee, A., Naumann, D.A.: Stack-based Access Control and Secure Information Flow. Journal of Functional Programming 15(2), 131-177 (2005)
-
(2005)
Journal of Functional Programming
, vol.15
, Issue.2
, pp. 131-177
-
-
Banerjee, A.1
Naumann, D.A.2
-
7
-
-
0032681509
-
A Core calculus of Dependency
-
Abadi, M., Banerjee, A., Heintze, N., Riecke, J.G.: A Core calculus of Dependency. In: Proc. ACM Symp. Principles of Programming Languages, pp. 147-160 (1999)
-
(1999)
Proc. ACM Symp. Principles of Programming Languages
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
8
-
-
84957671171
-
Partial evaluation and non-interference for object calculi
-
Middeldorp, A, ed, FLOPS 1999, Springer, Heidelberg
-
Barthe, C., Serpette, B.: Partial evaluation and non-interference for object calculi. In: Middeldorp, A. (ed.) FLOPS 1999. LNCS, vol. 1722, pp. 53-67. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1722
, pp. 53-67
-
-
Barthe, C.1
Serpette, B.2
-
9
-
-
0035276729
-
A Per Model of Secure Information Flow in Sequential Programs
-
Sabelfeld, A., Sands, D.: A Per Model of Secure Information Flow in Sequential Programs. Higher Order and Symbolic Computation 14(1), 59-91 (2001)
-
(2001)
Higher Order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
10
-
-
0000046942
-
-
Mizuno, M., Schmidt, D.: A Security Flow Control Algorithm and Its Denotational Semantics Correctness Proof. J. Formal Aspects of Comp. 4(6A). 727-754 (1992)
-
Mizuno, M., Schmidt, D.: A Security Flow Control Algorithm and Its Denotational Semantics Correctness Proof. J. Formal Aspects of Comp. 4(6A). 727-754 (1992)
-
-
-
-
11
-
-
0030370740
-
A Sound Type System for Secure Flow Analysis
-
Volpano, D., Smith, G., Irvine, C.: A Sound Type System for Secure Flow Analysis. J. Computer Security 4(3). 167-187 (1996)
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
12
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
Hamlen, K.W., Morrisett, C., Schneider. F.B.: Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. 28(1), 175-205 (2006)
-
(2006)
ACM Trans. Program. Lang. Syst
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.W.1
Morrisett, C.2
Schneider, F.B.3
-
13
-
-
49949098887
-
-
Le Guernic, G., Banerjee, A., Schmidt, D.: Automaton-based Non-interference Monitoring. Technical Report, -1, Kansas State University. Manhattan. KS. USA (April 2006) (2006), http://www.cis.ksu.edu/schmidt/ techreport/2006.list.html
-
Le Guernic, G., Banerjee, A., Schmidt, D.: Automaton-based Non-interference Monitoring. Technical Report, -1, Kansas State University. Manhattan. KS. USA (April 2006) (2006), http://www.cis.ksu.edu/schmidt/ techreport/2006.list.html
-
-
-
-
14
-
-
84881225236
-
Enforceable security policies
-
Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1). 30-50 (2000)
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
15
-
-
0028058408
-
A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions
-
McLean, J.: A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions. In: Proc. Symp. Security and Privacy, pp. 79-93 (1994)
-
(1994)
Proc. Symp. Security and Privacy
, pp. 79-93
-
-
McLean, J.1
-
17
-
-
21644475650
-
RIFLE: An Architectural Framework for User-Centric Information-Flow Security
-
Vachharajani, N., Bridges, M.J., Chang, J., Rangan, R., Ottoni, G., Blome, J.A., Reis. G.A., Vachharajani, M., August, D.I.: RIFLE: An Architectural Framework for User-Centric Information-Flow Security. In: Proc. Symp. Microarchitecture (2004)
-
(2004)
Proc. Symp. Microarchitecture
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
18
-
-
84958790465
-
Natural Semantics
-
Brandenburg, F.J, Wirsing, M, Vidal-Naquet. G, eds, STACS, 247. pp, Springer. Heidelberg
-
Kahn, G.: Natural Semantics. In: Brandenburg, F.J., Wirsing, M., Vidal-Naquet. G. (eds.) STACS 87. LNCS, vol. 247. pp. 22-39. Springer. Heidelberg (1987)
-
(1987)
LNCS
, vol.87
, pp. 22-39
-
-
Kahn, G.1
-
19
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Sec 4(1-2). 2-16 (2005)
-
(2005)
Int. J. Inf. Sec
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
20
-
-
49949100272
-
-
Viswanathan. M, Foundations for the Run-time Analysis of Software Systems. PhD thesis. University of Pennsylvania December
-
Viswanathan. M.: Foundations for the Run-time Analysis of Software Systems. PhD thesis. University of Pennsylvania (December 2000)
-
(2000)
-
-
-
21
-
-
0031648455
-
-
Smith, C. Volpano, D.: Secure Information Flow in a Multi-threaded Imperative Language. In: Proc. ACM Symp. on Principles of Programming Languages (January 1998). pp. 355-364 (1998)
-
Smith, C. Volpano, D.: Secure Information Flow in a Multi-threaded Imperative Language. In: Proc. ACM Symp. on Principles of Programming Languages (January 1998). pp. 355-364 (1998)
-
-
-
-
22
-
-
0012889295
-
A Language-Based Approach to Security
-
Wilhelm, K, ed, Informatics, Springer. Heidelberg
-
Schneider, F.B., Morrisett, C., Harper, R.: A Language-Based Approach to Security. In: Wilhelm, K. (ed.) Informatics. LNCS, vol. 2000. pp. 86-101. Springer. Heidelberg (2001)
-
(2001)
LNCS
, vol.2000
, pp. 86-101
-
-
Schneider, F.B.1
Morrisett, C.2
Harper, R.3
-
24
-
-
0033489650
-
SASI Enforcement of Security Policies: A Retrospective
-
ACM Press. New-York
-
Erlingsson, U., Schneider, F.B.: SASI Enforcement of Security Policies: A Retrospective. In: Proc. New Security Paradigms Workshop, pp. 87-95. ACM Press. New-York (1999)
-
(1999)
Proc. New Security Paradigms Workshop
, pp. 87-95
-
-
Erlingsson, U.1
Schneider, F.B.2
-
26
-
-
33646066871
-
-
Ligatti, J., Bauer, L., Walker, D.: Enforcing Non-safety Security Policies with Program Monitors. In: di Vimercati. S.d.C., Syverson, P.F., Gollmann, D. (eds.) ES-ORICS 2005. LNCS. 3679, pp. 355-373. Springer. Heidelberg (2005)
-
Ligatti, J., Bauer, L., Walker, D.: Enforcing Non-safety Security Policies with Program Monitors. In: di Vimercati. S.d.C., Syverson, P.F., Gollmann, D. (eds.) ES-ORICS 2005. LNCS. vol. 3679, pp. 355-373. Springer. Heidelberg (2005)
-
-
-
-
28
-
-
49949096881
-
-
Le Guernic, C. Jensen, T.: Monitoring Information Flow. In: Proceedings of the Workshop on Foundations of Computer Security (June 2005). pp. 19-30. DePaul University (2005)
-
Le Guernic, C. Jensen, T.: Monitoring Information Flow. In: Proceedings of the Workshop on Foundations of Computer Security (June 2005). pp. 19-30. DePaul University (2005)
-
-
-
-
29
-
-
16244362392
-
Detecting and Debugging Insecure Information Flows
-
Masri, W., Podgurski, A., Leon, D.: Detecting and Debugging Insecure Information Flows. In: Symp. on Software Reliability Engineering, pp. 198-209 (2004)
-
(2004)
Symp. on Software Reliability Engineering
, pp. 198-209
-
-
Masri, W.1
Podgurski, A.2
Leon, D.3
|