메뉴 건너뛰기




Volumn , Issue , 2008, Pages 89-100

A type system for data-flow integrity on windows Vista

Author keywords

Data flow integrity; Dynamic access control; Explicit substitution; Hybrid type system

Indexed keywords

DATA-FLOW INTEGRITY; DYNAMIC ACCESS CONTROL; EXPLICIT SUBSTITUTION; HYBRID TYPE SYSTEM; INTERESTING MODELS; OPERATING SYSTEMS; RUNTIME ACCESSES; TYPE SYSTEMS; TYPECHECKING; WINDOWS VISTAS;

EID: 57349156632     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1375696.1375708     Document Type: Conference Paper
Times cited : (7)

References (60)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 3
    • 0036040302 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • ACM
    • M. Abadi and B. Blanchet. Analyzing security protocols with secrecy types and logic programs. In POPL '02: Principles of Programming Languages, pages 33-44. ACM, 2002.
    • (2002) POPL '02: Principles of Programming Languages , pp. 33-44
    • Abadi, M.1    Blanchet, B.2
  • 8
    • 33947655397 scopus 로고    scopus 로고
    • Using access control for secure information flow in a Java-like language
    • IEEE
    • A. Banerjee and D. Naumann. Using access control for secure information flow in a Java-like language. In CSFW'03: Computer Security Foundations Workshop, pages 155-169. IEEE, 2003.
    • (2003) CSFW'03: Computer Security Foundations Workshop , pp. 155-169
    • Banerjee, A.1    Naumann, D.2
  • 9
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Technical Report TR-3153, MITRE Corporation
    • K. J. Biba. Integrity considerations for secure computer systems. Technical Report TR-3153, MITRE Corporation, 1977.
    • (1977)
    • Biba, K.J.1
  • 10
    • 0037014243 scopus 로고    scopus 로고
    • Noninterference for concurrent programs and thread systems
    • G. Boudol and I. Castellani. Noninterference for concurrent programs and thread systems. Theoretical Computer Science, 281(1-2):109-130, 2002.
    • (2002) Theoretical Computer Science , vol.281 , Issue.1-2 , pp. 109-130
    • Boudol, G.1    Castellani, I.2
  • 13
    • 33749574802 scopus 로고    scopus 로고
    • Dynamic access control in a concurrent object calculus
    • Springer
    • A. Chaudhuri. Dynamic access control in a concurrent object calculus. In CONCUR'06: Concurrency Theory, pages 263-278. Springer, 2006.
    • (2006) CONCUR'06: Concurrency Theory , pp. 263-278
    • Chaudhuri, A.1
  • 15
    • 57349159004 scopus 로고    scopus 로고
    • A. Chaudhuri, P. Naldurg, and S. Rajamani. A type system for dataflow integrity on Windows Vista. Technical Report TR-2007-86, Microsoft Research, 2007. Also available as an arXiv e-print at http://arxiv.org/abs/0803.3230.
    • A. Chaudhuri, P. Naldurg, and S. Rajamani. A type system for dataflow integrity on Windows Vista. Technical Report TR-2007-86, Microsoft Research, 2007. Also available as an arXiv e-print at http://arxiv.org/abs/0803.3230.
  • 16
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • IEEE
    • D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies. In SP '87: Symposium on Security and Privacy, pages 184-194. IEEE, 1987.
    • (1987) SP '87: Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 19
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. E. Demiing and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Demiing, D.E.1    Denning, P.J.2
  • 26
    • 0038414953 scopus 로고    scopus 로고
    • Typing correspondence assertions for communication protocols
    • A. D. Gordon and A. Jeffrey. Typing correspondence assertions for communication protocols. Theoretical Computer Science, 300(1-3):379-409, 2003.
    • (2003) Theoretical Computer Science , vol.300 , Issue.1-3 , pp. 379-409
    • Gordon, A.D.1    Jeffrey, A.2
  • 27
    • 27244444891 scopus 로고    scopus 로고
    • Secrecy despite compromise: Types, cryptography, and the pi-calculus
    • Springer
    • A. D. Gordon and A. Jeffrey. Secrecy despite compromise: Types, cryptography, and the pi-calculus. In CONCUR '05: Concurrency Theory, pages 186-201. Springer, 2005.
    • (2005) CONCUR '05: Concurrency Theory , pp. 186-201
    • Gordon, A.D.1    Jeffrey, A.2
  • 28
    • 29044443804 scopus 로고    scopus 로고
    • SafeDpi: A language for controlling mobile code
    • M. Hennessy, J. Rathke, and N. Yoshida. SafeDpi: A language for controlling mobile code. Acta Informatica, 42(4-5):227-290, 2005.
    • (2005) Acta Informatica , vol.42 , Issue.4-5 , pp. 227-290
    • Hennessy, M.1    Rathke, J.2    Yoshida, N.3
  • 31
    • 84979035734 scopus 로고    scopus 로고
    • D. Hoshina, E. Sumii, and A. Yonezawa. A typed process calculus for fine-grained resource access control in distributed computation. In TACS'01: Theoretical Aspects of Computer Software, pages 64-81. Springer, 2001
    • D. Hoshina, E. Sumii, and A. Yonezawa. A typed process calculus for fine-grained resource access control in distributed computation. In TACS'01: Theoretical Aspects of Computer Software, pages 64-81. Springer, 2001.
  • 33
    • 29044432466 scopus 로고    scopus 로고
    • Type-based information flow analysis for the pi-calculus
    • N. Kobayashi. Type-based information flow analysis for the pi-calculus. Acta Informatica, 42(4-5):291-347, 2005.
    • (2005) Acta Informatica , vol.42 , Issue.4-5 , pp. 291-347
    • Kobayashi, N.1
  • 34
    • 0017472779 scopus 로고
    • Proving the correctness of multiprocess programs
    • L. Lamport. Proving the correctness of multiprocess programs. IEEE Transactions on Software Engineering, 3(2):125-143, 1977.
    • (1977) IEEE Transactions on Software Engineering , vol.3 , Issue.2 , pp. 125-143
    • Lamport, L.1
  • 41
    • 34548708576 scopus 로고    scopus 로고
    • Beyond stack inspection: A unified access-control and information-flow security model
    • IEEE
    • M. Pistoia, A. Banerjee, and D. A. Naumann. Beyond stack inspection: A unified access-control and information-flow security model. In SP'07: Symposium on Security and Privacy, pages 149-163. IEEE, 2007.
    • (2007) SP'07: Symposium on Security and Privacy , pp. 149-163
    • Pistoia, M.1    Banerjee, A.2    Naumann, D.A.3
  • 44
    • 57349098980 scopus 로고    scopus 로고
    • Technet Magazine, June, Available at
    • M. Russinovich, Inside Windows Vista User Access Control. Microsoft Technet Magazine, June 2007. Available at http://www.microsoft.com/ technet/technetmag/issues/2007/06/UAC/.
    • (2007) Inside Windows Vista User Access Control
    • Russinovich, M.1
  • 48
  • 50
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, C. Irvine, and G. Smith. A sound type system for secure flow analysis. Journal of Computer Security, 4(2-3): 167-187, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.2-3 , pp. 167-187
    • Volpano, D.1    Irvine, C.2    Smith, G.3
  • 52
    • 57349087470 scopus 로고    scopus 로고
    • Windows Vista TechCenter. Understanding and configuring User Account Control in Windows Vista. Available at http://technet.microsoft.com/en-us/ windowsvista/ aa905117.aspx.
    • Windows Vista TechCenter. Understanding and configuring User Account Control in Windows Vista. Available at http://technet.microsoft.com/en-us/ windowsvista/ aa905117.aspx.
  • 54
    • 2442562500 scopus 로고    scopus 로고
    • Channel dependent types for higher-order mobile processes
    • ACM
    • N. Yoshida. Channel dependent types for higher-order mobile processes. In POPL'04: Principles of Programming Languages, pages 147-160. ACM, 2004.
    • (2004) POPL'04: Principles of Programming Languages , pp. 147-160
    • Yoshida, N.1
  • 56
  • 59
    • 57349184955 scopus 로고    scopus 로고
    • Personal communication, July
    • L. Zheng. Personal communication, July 2007.
    • (2007)
    • Zheng, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.