-
1
-
-
49949084633
-
-
Report on resource and information flow security requirements, Deliverable D1.1 of the EU 1ST FET GC2 MOBIUS project. (March 2006), http://mobius.inria.fr/
-
Report on resource and information flow security requirements, Deliverable D1.1 of the EU 1ST FET GC2 MOBIUS project. (March 2006), http://mobius.inria.fr/
-
-
-
-
2
-
-
0033702592
-
Transforming out timing leaks
-
January
-
Agat, J.: Transforming out timing leaks. In: Proc. POPL 2002, pp. 40-53 (January 2000)
-
(2000)
Proc. POPL 2002
, pp. 40-53
-
-
Agat, J.1
-
3
-
-
84879520825
-
Noninterference for concurrent programs
-
Orejas, F, Spirakis, P.G, van Leeuwen, J, eds, ICALP 2001, Springer. Heidelberg
-
Boudol, G., Castellani, I.: Noninterference for concurrent programs. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol. 2076, pp. 382-395. Springer. Heidelberg (2001)
-
(2001)
LNCS
, vol.2076
, pp. 382-395
-
-
Boudol, G.1
Castellani, I.2
-
4
-
-
0037014243
-
Non-interference for concurrent programs and thread systems
-
Boudol, G., Castellani, I.: Non-interference for concurrent programs and thread systems. Theoretical Computer Science 281(1). 109-130 (2002)
-
(2002)
Theoretical Computer Science
, vol.281
, Issue.1
, pp. 109-130
-
-
Boudol, G.1
Castellani, I.2
-
5
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM 20(7), 504-513 (1977)
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
6
-
-
84988393004
-
Classification of security properties (part I: Information flow)
-
Focardi, R, Gorrieri, R, eds, Foundations of Security Analysis and Design, Springer. Heidelberg
-
Focardi, R., Gorrieri, R.: Classification of security properties (part I: Information flow). In: Focardi, R., Gorrieri, R. (eds.) Foundations of Security Analysis and Design. LNCS, vol. 2171, pp. 331-396. Springer. Heidelberg (2001)
-
(2001)
LNCS
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
7
-
-
84947269249
-
Secure information flow as typed process behaviour
-
Smolka, G, ed, ESOP 2000 and ETAPS 2000, Springer, Heidelberg
-
Honda, K., Vasconcelos, V., Yoshida, N.: Secure information flow as typed process behaviour. In: Smolka, G. (ed.) ESOP 2000 and ETAPS 2000. LNCS, vol. 1782, Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1782
-
-
Honda, K.1
Vasconcelos, V.2
Yoshida, N.3
-
9
-
-
33947616857
-
-
Huisman, M., Worah, P., Sunesen, K.: A temporal logic characterisation of observational determinism. In: Proc. IEEE Computer Security Foundations Workshop (July 2006)
-
Huisman, M., Worah, P., Sunesen, K.: A temporal logic characterisation of observational determinism. In: Proc. IEEE Computer Security Foundations Workshop (July 2006)
-
-
-
-
10
-
-
49949090106
-
-
JSR 118 Expert Group, version 2.0. Java specification request, Java Community Process November
-
JSR 118 Expert Group. Mobile information device profile (MIDP). version 2.0. Java specification request, Java Community Process (November 2002)
-
(2002)
Mobile information device profile (MIDP)
-
-
-
12
-
-
33947663590
-
Networking, user experience, and threads
-
Knudsen, J.: Networking, user experience, and threads. Sun Technical Articles and Tips, (2002), http://developers.sun.com/techtopics/mobility/midp/ articles/threading/
-
(2002)
Sun Technical Articles and Tips
-
-
Knudsen, J.1
-
13
-
-
33745678531
-
-
Köpf, B., Mantel, H.: Eliminating implicit information leaks by transformational typing and unification. In: Dimitrakos, T., Martinelli. F., Ryan, P.Y.A., Schneider. S. (eds.) FAST 2005. LNCS, 3866, Springer, Heidelberg (2006)
-
Köpf, B., Mantel, H.: Eliminating implicit information leaks by transformational typing and unification. In: Dimitrakos, T., Martinelli. F., Ryan, P.Y.A., Schneider. S. (eds.) FAST 2005. LNCS, vol. 3866, Springer, Heidelberg (2006)
-
-
-
-
14
-
-
33947668912
-
Preventing screen lockups of blocking operations
-
Mahmoud, Q.H.: Preventing screen lockups of blocking operations. Sun Technical Articles and Tips (2004). http://developers.sun.com/techtopics/ mobility/midp/ttips/screenlock/
-
(2004)
Sun Technical Articles and Tips
-
-
Mahmoud, Q.H.1
-
15
-
-
84948737028
-
A simple view of type-secure information flow in the pi-calculus
-
IEEE Computer Society Press, Los Alamitos
-
Pottier, F.: A simple view of type-secure information flow in the pi-calculus. In: Proc. IEEE Computer Security Foundations Workshop, pp. 320-330. IEEE Computer Society Press, Los Alamitos (2002)
-
(2002)
Proc. IEEE Computer Security Foundations Workshop
, pp. 320-330
-
-
Pottier, F.1
-
16
-
-
33947645959
-
Securing interaction between threads and the scheduler
-
IEEE Computer Society Press, Los Alamitos
-
Russo, A., Sabelfeld, A.: Securing interaction between threads and the scheduler. In: Proc. IEEE Computer Security Foundations Workshop, pp. 177-189. IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
Proc. IEEE Computer Security Foundations Workshop
, pp. 177-189
-
-
Russo, A.1
Sabelfeld, A.2
-
17
-
-
38049174641
-
-
Russo, A., Sabelfeld, A.: Security for multithreaded programs under cooperative scheduling. In: Virbitskaite, I., Voronkov, A. (eds.) PSI 2006. LNCS, 4378, Springer, Heidelberg (2007)
-
Russo, A., Sabelfeld, A.: Security for multithreaded programs under cooperative scheduling. In: Virbitskaite, I., Voronkov, A. (eds.) PSI 2006. LNCS, vol. 4378, Springer, Heidelberg (2007)
-
-
-
-
18
-
-
49949107220
-
Mathematical models of computer security-tutorial lectures
-
Focardi, R, Gorrieri. R, eds, FOSAD 2001, Springer. Heidelberg
-
Ryan, P.: Mathematical models of computer security-tutorial lectures. In: Focardi, R., Gorrieri. R. (eds.) FOSAD 2001. LNCS, vol. 2946, Springer. Heidelberg (2004)
-
(2004)
LNCS
, vol.2946
-
-
Ryan, P.1
-
19
-
-
49949120080
-
-
Sabelfeld, A.: The impact of synchronisation on secure information flow in concurrent programs. In: Bjømer, D., Broy, M., Zamulin, A.V. (eds.) PSI 2001. LNCS, 2244, Springer, Heidelberg (2001)
-
Sabelfeld, A.: The impact of synchronisation on secure information flow in concurrent programs. In: Bjømer, D., Broy, M., Zamulin, A.V. (eds.) PSI 2001. LNCS, vol. 2244, Springer, Heidelberg (2001)
-
-
-
-
20
-
-
84958755151
-
-
Sabelfeld, A., Mantel, H.: Static confidentiality enforcement for distributed programs. In: Hermenegildo. M.V., Puebla, G. (eds.) SAS 2002. LNCS, 2477. Springer, Heidelberg (2002)
-
Sabelfeld, A., Mantel, H.: Static confidentiality enforcement for distributed programs. In: Hermenegildo. M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477. Springer, Heidelberg (2002)
-
-
-
-
22
-
-
0033700286
-
Probabilistic noninterference for multi-threaded programs
-
IEEE Computer Society Press, Los Alamitos
-
Sabelfeld, A., Sands, D.: Probabilistic noninterference for multi-threaded programs. In: Proc. IEEE Computer Security Foundations Workshop, pp. 200-214. IEEE Computer Society Press, Los Alamitos (2000)
-
(2000)
Proc. IEEE Computer Security Foundations Workshop
, pp. 200-214
-
-
Sabelfeld, A.1
Sands, D.2
-
23
-
-
0034835461
-
A new type system for secure information flow
-
IEEE Computer Society Press, Los Alamitos
-
Smith, G.: A new type system for secure information flow. In: Proc. IEEE Computer Security Foundations Workshop, pp. 115-125. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
Proc. IEEE Computer Security Foundations Workshop
, pp. 115-125
-
-
Smith, G.1
-
24
-
-
18544362925
-
Probabilistic noninterference through weak probabilistic bisimulation
-
IEEE Computer Society Press, Los Alamitos
-
Smith, G.: Probabilistic noninterference through weak probabilistic bisimulation. In: Proc. IEEE Computer Security Foundations Workshop, pp. 3-13. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
Proc. IEEE Computer Security Foundations Workshop
, pp. 3-13
-
-
Smith, G.1
-
25
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
ACM Press, New York
-
Smith, G., Volpano, D.: Secure information flow in a multi-threaded imperative language. In: Proc. ACM Symp. on Principles of Programming Languages, pp. 355-364. ACM Press, New York (1998)
-
(1998)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
26
-
-
33745938077
-
-
Smith, S.F., Thober, M.: Refactoring programs to secure information flows. In: PLAS 2006, pp. 75-84. ACM Press, New York (2006)
-
Smith, S.F., Thober, M.: Refactoring programs to secure information flows. In: PLAS 2006, pp. 75-84. ACM Press, New York (2006)
-
-
-
-
27
-
-
0033330060
-
Probabilistic noninterference in a concurrent language
-
Volpano, D., Smith, G.: Probabilistic noninterference in a concurrent language. J. Computer Security 7(2-3), 231-253 (1999)
-
(1999)
J. Computer Security
, vol.7
, Issue.2-3
, pp. 231-253
-
-
Volpano, D.1
Smith, G.2
-
28
-
-
0030370740
-
A sound type system for secure flow analysis
-
Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. J. Computer Security 4(3), 167-187 (1996)
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
30
-
-
84942242915
-
Observational determinism, for concurrent program, security
-
IEEE Computer Society Press, Los Alamitos
-
Zdancewic, S., Myers, A.C.: Observational determinism, for concurrent program, security. In: Proc. IEEE Computer Security Foundations Workshop, pp. 29-43. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
Proc. IEEE Computer Security Foundations Workshop
, pp. 29-43
-
-
Zdancewic, S.1
Myers, A.C.2
-
31
-
-
0038825029
-
Using replication and partitioning to build, secure distributed systems
-
IEEE Computer Society Press, Los Alamitos
-
Zheng, L., Chong, S., Myers, A.C., Zdancewic, S.: Using replication and partitioning to build, secure distributed systems. In: Proc. IEEE Symp. on Security and Privacy, pp. 236-250. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
Proc. IEEE Symp. on Security and Privacy
, pp. 236-250
-
-
Zheng, L.1
Chong, S.2
Myers, A.C.3
Zdancewic, S.4
|