-
1
-
-
51749101642
-
-
A. Banerjee, D. A. Naumann, and S. Rosenberg. Expressive declassiflcation policies and modular static enforcement. Technical Report CS Report 2007-04, Stevens Institute of Technology, Nov. 2007.
-
A. Banerjee, D. A. Naumann, and S. Rosenberg. Expressive declassiflcation policies and modular static enforcement. Technical Report CS Report 2007-04, Stevens Institute of Technology, Nov. 2007.
-
-
-
-
3
-
-
51749111321
-
End-to-end enforcement of erasure and declassiflcation
-
Technical Report, Apr
-
S. Chong and A. C. Myers. End-to-end enforcement of erasure and declassiflcation. Technical Report http://hdl. handle.net/1813/10504, Cornell University, Apr. 2008.
-
(2008)
-
-
Chong, S.1
Myers, A.C.2
-
5
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
8
-
-
0003518498
-
-
Addison Wesley, 2nd edition, ISBN 0-201-31008-2
-
J. Gosling, B. Joy, G. Steele, and G. Bracha. The Java Language Specification. Addison Wesley, 2nd edition, 2000. ISBN 0-201-31008-2.
-
(2000)
The Java Language Specification
-
-
Gosling, J.1
Joy, B.2
Steele, G.3
Bracha, G.4
-
14
-
-
0039015629
-
Authentication in distributed systems: Theory and practice
-
Proc. 13th ACM Symp. on Operating System Principles SOSP, October
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. In Proc. 13th ACM Symp. on Operating System Principles (SOSP), pages 165-182, October 1991. Operating System Review, 253(5).
-
(1991)
Operating System Review
, vol.253
, Issue.5
, pp. 165-182
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
18
-
-
51749089694
-
Jif: Java information flow. Software release, http: //www.cs. Cornell.edu/jif
-
July
-
A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow. Software release, http: //www.cs. Cornell.edu/jif, July 2001.
-
(2001)
-
-
Myers, A.C.1
Zheng, L.2
Zdancewic, S.3
Chong, S.4
Nystrom, N.5
-
23
-
-
51749106500
-
-
D. Søndergaard, Secure program partitioning in dynamic networks. Master's thesis, Technical University of Denmark, 2006. IMM-M. Sc-2006-92.
-
D. Søndergaard, Secure program partitioning in dynamic networks. Master's thesis, Technical University of Denmark, 2006. IMM-M. Sc-2006-92.
-
-
-
-
25
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
26
-
-
0036036793
-
Untrusted hosts and confidentiality: Secure program partitioning
-
Oct
-
S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers. Untrusted hosts and confidentiality: Secure program partitioning. In Proc. 18th ACM Symp. on Operating System Principles (SOSP), pages 1-14, Oct. 2001.
-
(2001)
Proc. 18th ACM Symp. on Operating System Principles (SOSP)
, pp. 1-14
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.C.4
|