-
2
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
Adam Back, Ulf Möller, and Anton Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. Lecture Notes in Computer Science, 2137, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2137
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
4
-
-
0003400255
-
-
Technical Report USAF Electronic Systems Division, Bedford, MA, April (Also available through National Technical Information Service, Springfield Va., NTIS AD-A039324.)
-
K. J. Biba. Integrity considerations for secure computer systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, April 1977. (Also available through National Technical Information Service, Springfield Va., NTIS AD-A039324.).
-
(1977)
Integrity Considerations for Secure Computer Systems
-
-
Biba, K.J.1
-
6
-
-
84879520825
-
Noninterference for concurrent programs
-
Proc. ICALP, July
-
Gerard Boudol and Ilaria Castellani. Noninterference for concurrent programs. In Proc. ICALP, volume 2076 of Lecture Notes in Computer Science, pages 382-395, July 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2076
, pp. 382-395
-
-
Boudol, G.1
Castellani, I.2
-
8
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
January
-
Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, and Qian Zhang. Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Conference, January 1998.
-
(1998)
Proceedings of the 7th USENIX Security Conference
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
9
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
Dorothy E. Denning and Peter J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
12
-
-
0038650568
-
Designing secure and reliable applications using fragmentation-redundancy-scattering: An object-oriented approach
-
Newcastle-upon-Tyne, Dept of Computing Science, University of Newcastle, NE1 7RU, UK
-
Jean-Charles Fabre, Yves Deswarte, and Brian Randell. Designing secure and reliable applications using fragmentation-redundancy-scattering: an object-oriented approach. In PDCS 2: Open Conference, pages 343-362, Newcastle-upon-Tyne, 1994. Dept of Computing Science, University of Newcastle, NE1 7RU, UK.
-
(1994)
PDCS 2: Open Conference
, pp. 343-362
-
-
Fabre, J.-C.1
Deswarte, Y.2
Randell, B.3
-
14
-
-
0016382977
-
Memoryless subsystems
-
May
-
J. S. Fenton. Memoryless subsystems. Computing J., 17(2):143-147, May 1974.
-
(1974)
Computing J.
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
17
-
-
0003608910
-
Typing correspondence assertions for communication protocols
-
Preliminary Proceedings of the 17th Conference on the Mathematical Foundations of Programming Semantics (MFPS 17), Aarhus, May 2001. May
-
Andrew D. Gordon and Alan Jeffrey. Typing correspondence assertions for communication protocols. In Preliminary Proceedings of the 17th Conference on the Mathematical Foundations of Programming Semantics (MFPS 17), Aarhus, May 2001. BRICS Notes Series NS-01-2, May 2001, pages 99-120.
-
(2001)
BRICS Notes Series NS-01-2
, pp. 99-120
-
-
Gordon, A.D.1
Jeffrey, A.2
-
21
-
-
4544334551
-
Are all e-commerce negotiations auctions?
-
Sophia-Antipolis, France, May
-
Gregory E. Kersten, Sunil J. Noronha, and Jeffrey Teich. Are all e-commerce negotiations auctions? In Proc. COOP'2000: 4th International Conference on the Design of Cooperative Systems,, Sophia-Antipolis, France, May 2000.
-
(2000)
Proc. COOP'2000: 4th International Conference on the Design of Cooperative Systems
-
-
Kersten, G.E.1
Noronha, S.J.2
Teich, J.3
-
22
-
-
0004237928
-
-
IR 5691, NIST
-
James R. Lyle, Dolores R. Wallace, James R. Graham, Keith. B. Gallagher, Joseph. P. Poole, and David. W. Binkley. Unravel: A CASE tool to assist evaluation of high integrity software. IR 5691, NIST, 1995.
-
(1995)
Unravel: A CASE Tool to Assist Evaluation of High Integrity Software
-
-
Lyle, J.R.1
Wallace, D.R.2
Graham, J.R.3
Gallagher, K.B.4
Poole, J.P.5
Binkley, D.W.6
-
24
-
-
0034823079
-
A generic approach to the security of multi-threaded programs
-
IEEE Computer Society Press, June
-
Heiko Mantel and Andrei Sabelfeld. A generic approach to the security of multi-threaded programs. In Proc. 14th IEEE Computer Security Foundations Workshop, pages 126-142. IEEE Computer Society Press, June 2001.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop
, pp. 126-142
-
-
Mantel, H.1
Sabelfeld, A.2
-
25
-
-
0026910016
-
Multilevel security in the UNIX tradition
-
August
-
M. Douglas McIlroy and James A. Reeds. Multilevel security in the UNIX tradition. Software - Practice and Experience, 22(8):673-694, August 1992.
-
(1992)
Software - Practice and Experience
, vol.22
, Issue.8
, pp. 673-694
-
-
McIlroy, M.D.1
Reeds, J.A.2
-
27
-
-
0016951438
-
Security kernel validation in practice
-
May
-
Jonathan K. Millen. Security kernel validation in practice. Comm. of the ACM, 19(5):243-250, May 1976.
-
(1976)
Comm. of the ACM
, vol.19
, Issue.5
, pp. 243-250
-
-
Millen, J.K.1
-
28
-
-
84937543808
-
Information flow analysis of formal specifications
-
April
-
Jonathan K. Millen. Information flow analysis of formal specifications. In Proc. IEEE Symposium on Security and Privacy, pages 3-8, April 1981.
-
(1981)
Proc. IEEE Symposium on Security and Privacy
, pp. 3-8
-
-
Millen, J.K.1
-
32
-
-
84955596529
-
Trust in the λ-calculus
-
Proc. 2nd International Symposium on Static Analysis, Springer, September
-
Jens Palsberg and Peter Ørbæk. Trust in the λ-calculus. In Proc. 2nd International Symposium on Static Analysis, number 983 in Lecture Notes in Computer Science, pages 314-329. Springer, September 1995.
-
(1995)
Lecture Notes in Computer Science
, Issue.983
, pp. 314-329
-
-
Palsberg, J.1
Ørbæk, P.2
-
33
-
-
84948737028
-
A simple view of type-secure information flow in the pi-calculus
-
June
-
François Pottier. A simple view of type-secure information flow in the pi-calculus. In Proc. IEEE Computer Security Foundations Workshop, pages 320-330, June 2002.
-
(2002)
Proc. IEEE Computer Security Foundations Workshop
, pp. 320-330
-
-
Pottier, F.1
-
37
-
-
84958755151
-
Static confidentiality enforcement for distributed programs
-
Proceedings of the 9th International Static Analysis Symposium, Madrid, Spain, September Springer-Verlag
-
Andrei Sabelfeld and Heiko Mantel. Static confidentiality enforcement for distributed programs. In Proceedings of the 9th International Static Analysis Symposium, volume 2477 of LNCS, Madrid, Spain, September 2002. Springer-Verlag.
-
(2002)
LNCS
, vol.2477
-
-
Sabelfeld, A.1
Mantel, H.2
-
39
-
-
0033700286
-
Probabilistic noninterference for multi-threaded programs
-
IEEE Computer Society Press, July
-
Andrei Sabelfeld and David Sands. Probabilistic noninterference for multi-threaded programs. In Proc. 13th IEEE Computer Security Foundations Workshop, pages 200-214. IEEE Computer Society Press, July 2000.
-
(2000)
Proc. 13th IEEE Computer Security Foundations Workshop
, pp. 200-214
-
-
Sabelfeld, A.1
Sands, D.2
-
40
-
-
0025564050
-
Implementing fault-tolerant services using the state machine approach: A tutorial
-
December
-
Fred B. Schneider. Implementing fault-tolerant services using the state machine approach: a tutorial. ACM Computing Surveys, 22(4):299-319, December 1990.
-
(1990)
ACM Computing Surveys
, vol.22
, Issue.4
, pp. 299-319
-
-
Schneider, F.B.1
-
41
-
-
84881225236
-
Enforceable security policies
-
Also available as TR 99-1759, Computer Science Department, Cornell University, Ithaca, New York
-
Fred B. Schneider. Enforceable security policies. ACM Transactions on Information and System Security, 3(1):30-50, 2001. Also available as TR 99-1759, Computer Science Department, Cornell University, Ithaca, New York.
-
(2001)
ACM Transactions on Information and System Security
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
42
-
-
0003855464
-
-
John Wiley and Sons, New York, NY
-
Bruce Schneier. Applied Cryptography. John Wiley and Sons, New York, NY, 1996.
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
-
44
-
-
0034835461
-
A new type system for secure information flow
-
IEEE Computer Society Press, June
-
Geoffrey Smith. A new type system for secure information flow. In CSFW14, pages 115-125. IEEE Computer Society Press, June 2001.
-
(2001)
CSFW14
, pp. 115-125
-
-
Smith, G.1
-
45
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
San Diego, California, January
-
Geoffrey Smith and Dennis Volpano. Secure information flow in a multi-threaded imperative language. In Proc. 25th ACM Symp. on Principles of Programming Languages (POPL), pages 355-364, San Diego, California, January 1998.
-
(1998)
Proc. 25th ACM Symp. on Principles of Programming Languages (POPL)
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
46
-
-
0005343322
-
-
Technical report, Project Athena, MIT, Cambridge, MA, March
-
Jennifer G. Steiner, B. Clifford Neuman, and Jeffrey I. Schiller. Kerberos: An authentication service for open network systems. Technical report, Project Athena, MIT, Cambridge, MA, March 1988.
-
(1988)
Kerberos: An Authentication Service for Open Network Systems
-
-
Steiner, J.G.1
Neuman, B.C.2
Schiller, J.I.3
-
47
-
-
84978374045
-
Self-securing storage: Protecting data in compromised systems
-
San Diego, CA, October
-
John D. Strunk, Garth R. Goodson, Michael L. Scheinholtz, Craig A. N. Soules, and Gregory R. Ganger. Self-securing storage: Protecting data in compromised systems. In Operating Systems Design and Implementation (OSDI), pages 165-180, San Diego, CA, October 2000.
-
(2000)
Operating Systems Design and Implementation (OSDI)
, pp. 165-180
-
-
Strunk, J.D.1
Goodson, G.R.2
Scheinholtz, M.L.3
Soules, C.A.N.4
Ganger, G.R.5
-
48
-
-
0003468988
-
-
version 1.0 beta edition, October
-
Sun Microsystems. Java Language Specification, version 1.0 beta edition, October 1995. Available at ftp://ftp.javasoft.com/docs/javaspec.ps.zip.
-
(1995)
Java Language Specification
-
-
Sun Microsystems1
-
50
-
-
0000990322
-
A survey of program slicing techniques
-
Frank Tip. A survey of program slicing techniques. Journal of Programming Languages, 3:121-189, 1995.
-
(1995)
Journal of Programming Languages
, vol.3
, pp. 121-189
-
-
Tip, F.1
-
51
-
-
0037974226
-
Improvement of data processing security by means of fault tolerance
-
Washington, USA
-
Gilles Trouessin, Jean-Charles Fabre, and Yves Deswarte. Improvement of data processing security by means of fault tolerance. In 14th National Computer Security Conference, pages 295-304, Washington, USA, 1991.
-
(1991)
14th National Computer Security Conference
, pp. 295-304
-
-
Trouessin, G.1
Fabre, J.-C.2
Deswarte, Y.3
-
52
-
-
0033330060
-
Probabilistic noninterference in a concurrent language
-
November
-
Dennis Volpano and Geoffrey Smith. Probabilistic noninterference in a concurrent language. J. Computer Security, 7(23):231-253, November 1999.
-
(1999)
J. Computer Security
, vol.7
, Issue.2-3
, pp. 231-253
-
-
Volpano, D.1
Smith, G.2
-
53
-
-
0030370740
-
A sound type system for secure flow analysis
-
Dennis Volpano, Geoffrey Smith, and Cynthia Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
54
-
-
0027836576
-
Efficient software-based fault isolation
-
ACM Press, December
-
Robert Wahbe, Steven Lucco, Thomas E. Anderson, and Susan L. Graham. Efficient software-based fault isolation. In Proc. 14th ACM Symp. on Operating System Principles, pages 203-216. ACM Press, December 1993.
-
(1993)
Proc. 14th ACM Symp. on Operating System Principles
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
55
-
-
0039334688
-
The security architecture formerly known as stack inspection: A security mechanism for language-based systems
-
October
-
Dan S. Wallach, Andrew W. Appel, and Edward W. Felten. The security architecture formerly known as stack inspection: A security mechanism for language-based systems. ACM Transactions on Software Engineering and Methodology, 9(4), October 2000.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
-
-
Wallach, D.S.1
Appel, A.W.2
Felten, E.W.3
-
58
-
-
85084164692
-
SSH - Secure login connections over the Internet
-
San Jose, California
-
Tatu Ylonen. SSH - secure login connections over the Internet. In The Sixth USENIX Security Symposium Proceedings, pages 37-42, San Jose, California, 1996.
-
(1996)
The Sixth USENIX Security Symposium Proceedings
, pp. 37-42
-
-
Ylonen, T.1
-
59
-
-
0034822370
-
Robust declassification
-
Cape Breton, Nova Scotia, Canada, June
-
Steve Zdancewic and Andrew C. Myers. Robust declassification. In Proc. 14th IEEE Computer Security Foundations Workshop, pages 15-23, Cape Breton, Nova Scotia, Canada, June 2001.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop
, pp. 15-23
-
-
Zdancewic, S.1
Myers, A.C.2
-
60
-
-
84945262623
-
Secure information flow and CPS
-
Proc. 10th European Symposium on Programming
-
Steve Zdancewic and Andrew C. Myers. Secure information flow and CPS. In Proc. 10th European Symposium on Programming, volume 2028 of Lecture Notes in Computer Science, pages 46-61, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2028
, pp. 46-61
-
-
Zdancewic, S.1
Myers, A.C.2
-
61
-
-
0037974191
-
Secure program partitioning
-
August
-
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers. Secure program partitioning. ACM Transactions on Computer Systems, 20(3):283-328, August 2002.
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.3
, pp. 283-328
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.C.4
|