-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0032681509
-
A core calculus of dependency
-
ACM
-
M. Abadi, A. Banerjee, N. Heintze, and J. G. Riecke. A core calculus of dependency. In POPL '99: Principles of Programming Languages, pages 147-160. ACM, 1999.
-
(1999)
POPL '99: Principles of Programming Languages
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
4
-
-
0025212954
-
Explicit substitutions
-
ACM
-
M. Abadi, L. Cardelli, P.-L. Curien, and J.-J. Levy. Explicit substitutions. In POPL '90: Principles of Programming Languages, pages 31-46. ACM, 1990.
-
(1990)
POPL '90: Principles of Programming Languages
, pp. 31-46
-
-
Abadi, M.1
Cardelli, L.2
Curien, P.-L.3
Levy, J.-J.4
-
8
-
-
33947655397
-
Using access control for secure information flow in a Java-like language
-
IEEE
-
A. Banerjee and D. Naumann. Using access control for secure information flow in a Java-like language. In CSFW'03: Computer Security Foundations Workshop, pages 155-169. IEEE, 2003.
-
(2003)
CSFW'03: Computer Security Foundations Workshop
, pp. 155-169
-
-
Banerjee, A.1
Naumann, D.2
-
9
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Technical Report TR-3153, MITRE Corporation
-
K. J. Biba. Integrity considerations for secure computer systems. Technical Report TR-3153, MITRE Corporation, 1977.
-
(1977)
-
-
Biba, K.J.1
-
10
-
-
0037014243
-
Noninterference for concurrent programs and thread systems
-
G. Boudol and I. Castellani. Noninterference for concurrent programs and thread systems. Theoretical Computer Science, 281(1-2):109-130, 2002.
-
(2002)
Theoretical Computer Science
, vol.281
, Issue.1-2
, pp. 109-130
-
-
Boudol, G.1
Castellani, I.2
-
11
-
-
12444303307
-
Secrecy and group creation
-
L. Cardelli, G. Ghelli, and A. D. Gordon. Secrecy and group creation. Information and Computation, 196(2):127-155, 2005.
-
(2005)
Information and Computation
, vol.196
, Issue.2
, pp. 127-155
-
-
Cardelli, L.1
Ghelli, G.2
Gordon, A.D.3
-
13
-
-
33749574802
-
Dynamic access control in a concurrent object calculus
-
Springer
-
A. Chaudhuri. Dynamic access control in a concurrent object calculus. In CONCUR'06: Concurrency Theory, pages 263-278. Springer, 2006.
-
(2006)
CONCUR'06: Concurrency Theory
, pp. 263-278
-
-
Chaudhuri, A.1
-
15
-
-
57349159004
-
-
A. Chaudhuri, P. Naldurg, and S. Rajamani. A type system for dataflow integrity on Windows Vista. Technical Report TR-2007-86, Microsoft Research, 2007. Also available as an arXiv e-print at http://arxiv.org/abs/0803.3230.
-
A. Chaudhuri, P. Naldurg, and S. Rajamani. A type system for dataflow integrity on Windows Vista. Technical Report TR-2007-86, Microsoft Research, 2007. Also available as an arXiv e-print at http://arxiv.org/abs/0803.3230.
-
-
-
-
16
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
IEEE
-
D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies. In SP '87: Symposium on Security and Privacy, pages 184-194. IEEE, 1987.
-
(1987)
SP '87: Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
19
-
-
0017517624
-
Certification of programs for secure information flow
-
D. E. Demiing and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Demiing, D.E.1
Denning, P.J.2
-
20
-
-
84885664275
-
Labels and event processes in the Asbestos operating system
-
ACM
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system. In SOSP'05: Symposium on Operating Systems Principles, pages 17-30. ACM, 2005.
-
(2005)
SOSP'05: Symposium on Operating Systems Principles
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
26
-
-
0038414953
-
Typing correspondence assertions for communication protocols
-
A. D. Gordon and A. Jeffrey. Typing correspondence assertions for communication protocols. Theoretical Computer Science, 300(1-3):379-409, 2003.
-
(2003)
Theoretical Computer Science
, vol.300
, Issue.1-3
, pp. 379-409
-
-
Gordon, A.D.1
Jeffrey, A.2
-
27
-
-
27244444891
-
Secrecy despite compromise: Types, cryptography, and the pi-calculus
-
Springer
-
A. D. Gordon and A. Jeffrey. Secrecy despite compromise: Types, cryptography, and the pi-calculus. In CONCUR '05: Concurrency Theory, pages 186-201. Springer, 2005.
-
(2005)
CONCUR '05: Concurrency Theory
, pp. 186-201
-
-
Gordon, A.D.1
Jeffrey, A.2
-
28
-
-
29044443804
-
SafeDpi: A language for controlling mobile code
-
M. Hennessy, J. Rathke, and N. Yoshida. SafeDpi: A language for controlling mobile code. Acta Informatica, 42(4-5):227-290, 2005.
-
(2005)
Acta Informatica
, vol.42
, Issue.4-5
, pp. 227-290
-
-
Hennessy, M.1
Rathke, J.2
Yoshida, N.3
-
31
-
-
84979035734
-
-
D. Hoshina, E. Sumii, and A. Yonezawa. A typed process calculus for fine-grained resource access control in distributed computation. In TACS'01: Theoretical Aspects of Computer Software, pages 64-81. Springer, 2001
-
D. Hoshina, E. Sumii, and A. Yonezawa. A typed process calculus for fine-grained resource access control in distributed computation. In TACS'01: Theoretical Aspects of Computer Software, pages 64-81. Springer, 2001.
-
-
-
-
33
-
-
29044432466
-
Type-based information flow analysis for the pi-calculus
-
N. Kobayashi. Type-based information flow analysis for the pi-calculus. Acta Informatica, 42(4-5):291-347, 2005.
-
(2005)
Acta Informatica
, vol.42
, Issue.4-5
, pp. 291-347
-
-
Kobayashi, N.1
-
34
-
-
0017472779
-
Proving the correctness of multiprocess programs
-
L. Lamport. Proving the correctness of multiprocess programs. IEEE Transactions on Software Engineering, 3(2):125-143, 1977.
-
(1977)
IEEE Transactions on Software Engineering
, vol.3
, Issue.2
, pp. 125-143
-
-
Lamport, L.1
-
41
-
-
34548708576
-
Beyond stack inspection: A unified access-control and information-flow security model
-
IEEE
-
M. Pistoia, A. Banerjee, and D. A. Naumann. Beyond stack inspection: A unified access-control and information-flow security model. In SP'07: Symposium on Security and Privacy, pages 149-163. IEEE, 2007.
-
(2007)
SP'07: Symposium on Security and Privacy
, pp. 149-163
-
-
Pistoia, M.1
Banerjee, A.2
Naumann, D.A.3
-
43
-
-
27844549441
-
A systematic approach to static access control
-
F. Pottier, C. Skalka, and S. Smith. A systematic approach to static access control. ACM Transactions on Programming Languages and Systems, 27(2):344-382, 2005.
-
(2005)
ACM Transactions on Programming Languages and Systems
, vol.27
, Issue.2
, pp. 344-382
-
-
Pottier, F.1
Skalka, C.2
Smith, S.3
-
44
-
-
57349098980
-
-
Technet Magazine, June, Available at
-
M. Russinovich, Inside Windows Vista User Access Control. Microsoft Technet Magazine, June 2007. Available at http://www.microsoft.com/ technet/technetmag/issues/2007/06/UAC/.
-
(2007)
Inside Windows Vista User Access Control
-
-
Russinovich, M.1
-
47
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
ACM
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS'04: Architectural Support for Programming Languages and Operating Systems, pages 85-96. ACM, 2004.
-
(2004)
ASPLOS'04: Architectural Support for Programming Languages and Operating Systems
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
49
-
-
84887309913
-
Cross site scripting prevention with dynamic data tainting and static analysis
-
ISOC
-
P. Vogt, F. Nentwich, N. Jovanovic, C. Kruegel, E. Kirda, and G. Vigna. Cross site scripting prevention with dynamic data tainting and static analysis. In NDSS'07: Network and Distributed System Security Symposium. ISOC, 2007.
-
(2007)
NDSS'07: Network and Distributed System Security Symposium
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kruegel, C.4
Kirda, E.5
Vigna, G.6
-
50
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, C. Irvine, and G. Smith. A sound type system for secure flow analysis. Journal of Computer Security, 4(2-3): 167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-187
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
-
52
-
-
57349087470
-
-
Windows Vista TechCenter. Understanding and configuring User Account Control in Windows Vista. Available at http://technet.microsoft.com/en-us/ windowsvista/ aa905117.aspx.
-
Windows Vista TechCenter. Understanding and configuring User Account Control in Windows Vista. Available at http://technet.microsoft.com/en-us/ windowsvista/ aa905117.aspx.
-
-
-
-
53
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
ACM
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: capturing system-wide information flow for malware detection and analysis. In CCS'07: Computer and Communications Security, pages 116-127. ACM, 2007.
-
(2007)
CCS'07: Computer and Communications Security
, pp. 116-127
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
54
-
-
2442562500
-
Channel dependent types for higher-order mobile processes
-
ACM
-
N. Yoshida. Channel dependent types for higher-order mobile processes. In POPL'04: Principles of Programming Languages, pages 147-160. ACM, 2004.
-
(2004)
POPL'04: Principles of Programming Languages
, pp. 147-160
-
-
Yoshida, N.1
-
58
-
-
84888352157
-
Making information flow explicit in HiStar
-
USENIX
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazières. Making information flow explicit in HiStar. In OSDI'06: Operating Systems Design and Implementation, pages 19-19. USENIX, 2006.
-
(2006)
OSDI'06: Operating Systems Design and Implementation
, pp. 19-19
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
-
59
-
-
57349184955
-
-
Personal communication, July
-
L. Zheng. Personal communication, July 2007.
-
(2007)
-
-
Zheng, L.1
|