-
1
-
-
0032681509
-
A core calculus of dependency
-
January
-
M. Abadi, A. Banerjee, N. Heintze, and J. Riecke. A core calculus of dependency. In Proc. ACM Symp. on Principles of Programming Languages, pages 147-160, January 1999.
-
(1999)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.4
-
2
-
-
36448980958
-
Localized delimited release: Combining the what and where dimensions of information release
-
New York, NY, USA, ACM
-
A. Askarov and A. Sabelfeld. Localized delimited release: combining the what and where dimensions of information release. In PLAS '07: Proceedings of the 2007 workshop on Programming languages and analysis for security, pages 53-60, New York, NY, USA, 2007. ACM.
-
(2007)
PLAS '07: Proceedings of the 2007 workshop on Programming languages and analysis for security
, pp. 53-60
-
-
Askarov, A.1
Sabelfeld, A.2
-
3
-
-
33745794062
-
Flow locks: Towards a core calculus for dynamic flow policies
-
Peter Sestoft, editor, Proc. European Symp. on Programming, of, Springer
-
N. Broberg and D. Sands. Flow locks: Towards a core calculus for dynamic flow policies. In Peter Sestoft, editor, Proc. European Symp. on Programming, volume 3924 of Lecture Notes in Computer Science, pages 180-196. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3924
, pp. 180-196
-
-
Broberg, N.1
Sands, D.2
-
5
-
-
0345275464
-
Quantitative analysis of the leakage of confidential data
-
Elsevier
-
D. Clark, S. Hunt, and P. Malacaria. Quantitative analysis of the leakage of confidential data. In QAPL'01, Proc. Quantitative Aspects of Programming Languages, volume 59 of ENTCS. Elsevier, 2002.
-
(2002)
QAPL'01, Proc. Quantitative Aspects of Programming Languages, volume 59 of ENTCS
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
6
-
-
0001760770
-
Information transmission in sequential programs
-
R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Academic Press
-
E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
8
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning. A lattice model of secure information flow. Comm. of the ACM, 19(5):236-243, May 1976.
-
(1976)
Comm. of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
9
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
11
-
-
49949102660
-
Automata-based confidentiality monitoring
-
Proc. Annual Asian Computing Science Conference, of, Springer-Verlag, December
-
G. Le Guernic, A. Banerjee, T. Jensen, and D. Schmidt. Automata-based confidentiality monitoring. In Proc. Annual Asian Computing Science Conference, volume 4435 of LNCS, pages 75-89. Springer-Verlag, December 2006.
-
(2006)
LNCS
, vol.4435
, pp. 75-89
-
-
Le Guernic, G.1
Banerjee, A.2
Jensen, T.3
Schmidt, D.4
-
12
-
-
28144451172
-
Achieving information flow security through precise control of effects
-
Washington, DC, USA, IEEE Computer Society
-
W. L. Harrison and J. Hook. Achieving information flow security through precise control of effects. In CSFW '05: Proceedings of the 18th IEEE workshop on Computer Security Foundations, pages 16-30, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
CSFW '05: Proceedings of the 18th IEEE workshop on Computer Security Foundations
, pp. 16-30
-
-
Harrison, W.L.1
Hook, J.2
-
14
-
-
0033751744
-
Generalising monads to arrows
-
J. Hughes. Generalising monads to arrows. Science of Computer Programming, 37(1-3):67-111, 2000.
-
(2000)
Science of Computer Programming
, vol.37
, Issue.1-3
, pp. 67-111
-
-
Hughes, J.1
-
16
-
-
0033705215
-
Implicit parameters: Dynamic scoping with static types
-
New York, NY, USA, ACM
-
J. R. Lewis, J. Launchbury, E. Meijer, and M. B. Shields. Implicit parameters: dynamic scoping with static types. InPOPL '00: Proceedings of the 27th ACM SIGPLAN-SIGACT symposium onPrinciples of programming languages, pages 108-118, New York, NY, USA, 2000. ACM.
-
(2000)
InPOPL '00: Proceedings of the 27th ACM SIGPLAN-SIGACT symposium onPrinciples of programming languages
, pp. 108-118
-
-
Lewis, J.R.1
Launchbury, J.2
Meijer, E.3
Shields, M.B.4
-
18
-
-
63149143963
-
-
P. Li and S. Zdancewic. Arrows for secure information flow. Available at http://www.seas.upenn.edu/~lipeng/homepage/lz06tcs.pdf, 2007.
-
P. Li and S. Zdancewic. Arrows for secure information flow. Available at http://www.seas.upenn.edu/~lipeng/homepage/lz06tcs.pdf, 2007.
-
-
-
-
20
-
-
37149055443
-
Controlling the what and where of declassification in language-based security
-
editor, Springer, ISBN 978-3-540-71314-2
-
H. Mantel and A. Reinhard. Controlling the what and where of declassification in language-based security. In Rocco De Nicola, editor, European Symposium on Programming (ESOP), volume 4421 of LNCS, pages 141-156. Springer, 2007. ISBN 978-3-540-71314-2.
-
(2007)
European Symposium on Programming (ESOP), volume 4421 of LNCS
, pp. 141-156
-
-
Mantel, H.1
Reinhard, A.2
-
22
-
-
0031682833
-
Complete, safe information flow with decentralized labels
-
May
-
A. C. Myers and B. Liskov. Complete, safe information flow with decentralized labels. In Proc. IEEE Symp. on Security and Privacy, pages 186-197, May 1998.
-
(1998)
Proc. IEEE Symp. on Security and Privacy
, pp. 186-197
-
-
Myers, A.C.1
Liskov, B.2
-
25
-
-
33745788833
-
Fast dictionary attacks on passwords using time-space tradeoff
-
New York, NY, USA, ACM
-
A. Narayanan and V. Shmatikov. Fast dictionary attacks on passwords using time-space tradeoff. In CCS '05: Proceedings of the 12th ACM conference on Computer and communications security, pages 364-372, New York, NY, USA, 2005. ACM.
-
(2005)
CCS '05: Proceedings of the 12th ACM conference on Computer and communications security
, pp. 364-372
-
-
Narayanan, A.1
Shmatikov, V.2
-
28
-
-
63149113458
-
-
A. Russo, K. Claessen, and J. Hughes. A library for light-weight information-flow security in Haskell. Software release and documentation. Available at http://www.es.chalmers.se/~msso/seclib.htm, 2008a.
-
A. Russo, K. Claessen, and J. Hughes. A library for light-weight information-flow security in Haskell. Software release and documentation. Available at http://www.es.chalmers.se/~msso/seclib.htm, 2008a.
-
-
-
-
29
-
-
63149182163
-
A library for light-weight information-flow security in Haskell. Technical Report. Chalmers University of Technology
-
To appear, October
-
A. Russo, K. Claessen, and J. Hughes. A library for light-weight information-flow security in Haskell. Technical Report. Chalmers University of Technology. To appear., October 2008b.
-
(2008)
-
-
Russo, A.1
Claessen, K.2
Hughes, J.3
-
30
-
-
35048828759
-
A model for delimited information release
-
Proc. International Symp. on Software Security ISSS'03, of, Springer-Verlag, October
-
A. Sabelfeld and A. C. Myers. A model for delimited information release. In Proc. International Symp. on Software Security (ISSS'03), volume 3233 of LNCS, pages 174-191. Springer-Verlag, October 2004.
-
(2004)
LNCS
, vol.3233
, pp. 174-191
-
-
Sabelfeld, A.1
Myers, A.C.2
-
32
-
-
35048880192
-
Dynamic dependency monitoring to secure information flow
-
P. Shroff, S. Smith, and M. Thober. Dynamic dependency monitoring to secure information flow. Computer Security Foundations Symposium, 2007. CSF '07. 20th IEEE, pages 203-217, 2007.
-
(2007)
Computer Security Foundations Symposium, 2007. CSF '07. 20th IEEE
, pp. 203-217
-
-
Shroff, P.1
Smith, S.2
Thober, M.3
-
34
-
-
0004193866
-
-
Prentice Hall PTR, Upper Saddle River, NJ, USA, ISBN 0130313580
-
A. S. Tanenbaum. Modern Operating Systems. Prentice Hall PTR, Upper Saddle River, NJ, USA, 2001. ISBN 0130313580.
-
(2001)
Modern Operating Systems
-
-
Tanenbaum, A.S.1
-
36
-
-
9744265826
-
Translating dependency into parametricky
-
New York, NY, USA, ACM
-
S. Tse and S. Zdancewic. Translating dependency into parametricky. In ICFP '04: Proceedings of the ninth ACM SIGPLAN international conference on Functional programming, pages 115-125, New York, NY, USA, 2004. ACM.
-
(2004)
ICFP '04: Proceedings of the ninth ACM SIGPLAN international conference on Functional programming
, pp. 115-125
-
-
Tse, S.1
Zdancewic, S.2
-
37
-
-
84956989228
-
A type-based approach to program security
-
Proc. TAPSOFT'97, of, Springer-Verlag, April
-
D. Volpano and G. Smith. A type-based approach to program security. In Proc. TAPSOFT'97, volume 1214 of LNCS, pages 607-621. Springer-Verlag, April 1997.
-
(1997)
LNCS
, vol.1214
, pp. 607-621
-
-
Volpano, D.1
Smith, G.2
-
38
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3): 167-187, 1996.
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|