메뉴 건너뛰기




Volumn , Issue , 2008, Pages 98-111

End-to-end enforcement of erasure and declassification

Author keywords

[No Author keywords available]

Indexed keywords

CASE STUDIES; COMPUTER SECURITY; PROGRAMMING LANGUAGES; RUN-TIME;

EID: 51749115761     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2008.12     Document Type: Conference Paper
Times cited : (38)

References (26)
  • 1
    • 51749101642 scopus 로고    scopus 로고
    • A. Banerjee, D. A. Naumann, and S. Rosenberg. Expressive declassiflcation policies and modular static enforcement. Technical Report CS Report 2007-04, Stevens Institute of Technology, Nov. 2007.
    • A. Banerjee, D. A. Naumann, and S. Rosenberg. Expressive declassiflcation policies and modular static enforcement. Technical Report CS Report 2007-04, Stevens Institute of Technology, Nov. 2007.
  • 3
    • 51749111321 scopus 로고    scopus 로고
    • End-to-end enforcement of erasure and declassiflcation
    • Technical Report, Apr
    • S. Chong and A. C. Myers. End-to-end enforcement of erasure and declassiflcation. Technical Report http://hdl. handle.net/1813/10504, Cornell University, Apr. 2008.
    • (2008)
    • Chong, S.1    Myers, A.C.2
  • 5
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 14
    • 0039015629 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • Proc. 13th ACM Symp. on Operating System Principles SOSP, October
    • B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. In Proc. 13th ACM Symp. on Operating System Principles (SOSP), pages 165-182, October 1991. Operating System Review, 253(5).
    • (1991) Operating System Review , vol.253 , Issue.5 , pp. 165-182
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 18
    • 51749089694 scopus 로고    scopus 로고
    • Jif: Java information flow. Software release, http: //www.cs. Cornell.edu/jif
    • July
    • A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow. Software release, http: //www.cs. Cornell.edu/jif, July 2001.
    • (2001)
    • Myers, A.C.1    Zheng, L.2    Zdancewic, S.3    Chong, S.4    Nystrom, N.5
  • 23
    • 51749106500 scopus 로고    scopus 로고
    • D. Søndergaard, Secure program partitioning in dynamic networks. Master's thesis, Technical University of Denmark, 2006. IMM-M. Sc-2006-92.
    • D. Søndergaard, Secure program partitioning in dynamic networks. Master's thesis, Technical University of Denmark, 2006. IMM-M. Sc-2006-92.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.