-
1
-
-
0029694540
-
Analysis and caching of dependencies
-
M. Abadi, B. Lampson, and J.-J. Levy. Analysis and caching of dependencies. In ICFP '96: Proceedings of the First ACM SIGPLAN International Conference on Functional Programming, pages 83-91, 1996. (Pubitemid 126669211)
-
(1996)
SIGPLAN Notices (ACM Special Interest Group on Programming Languages)
, vol.31
, Issue.6
, pp. 83-91
-
-
Abadi, M.1
Lampson, B.2
Levy, J.-J.3
-
5
-
-
66149192894
-
Secure computer systems: Mathematical foundations
-
November
-
D. Bell and L. LaPadula. Secure computer systems: mathematical foundations. Report MTR 2547 v2, MITRE, November 1973.
-
(1973)
Report MTR 2547 v2, MITRE
-
-
Bell, D.1
Padula, L.L.2
-
7
-
-
0035838828
-
Static analysis for the πcalculus with applications to security
-
C. Bodei, P. Degano, F. Nielson, and H. Riis Nielson. Static analysis for the-calculus with applications to security. Information and Computation, 168:68-92, 2001.
-
(2001)
Information and Computation
, vol.168
, pp. 68-92
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
8
-
-
48649085342
-
Fine-grained information flow analysis and enforcement in a Java virtual machine
-
December, IEEE Computer Society Publications
-
D. Chandra and M. Franz. Fine-grained information flow analysis and enforcement in a Java virtual machine. In 23rd Annual Computer Security Applications Conference (ACSAC 2007), pages 463-474. IEEE Computer Society Publications, December 2007.
-
(2007)
23rd Annual Computer Security Applications Conference (ACSAC 2007)
, pp. 463-474
-
-
Chandra, D.1
Franz, M.2
-
9
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
10
-
-
0017517624
-
Certification of programs for secure information flow
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
11
-
-
0033489650
-
SASI Enforcement of security policies: A retrospective
-
Ontario, Canada, 22-24, ACM SIGSAC, ACM Press
-
U. Erlingsson and F. B. Schneider. SASI Enforcement of Security Policies: A Retrospective. In New Security Paradigms Workshop, pages 87-95, Ontario, Canada, 22-24 1999. ACM SIGSAC, ACM Press.
-
(1999)
New Security Paradigms Workshop
, pp. 87-95
-
-
Erlingsson, U.1
Schneider, F.B.2
-
12
-
-
0036147522
-
Improving security using extensible lightweight static analysis
-
DOI 10.1109/52.976940
-
D. Evans and D. Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, Jan/Feb, 2002. (Pubitemid 34069369)
-
(2002)
IEEE Software
, vol.19
, Issue.1
, pp. 42-51
-
-
Evans, D.1
Larochelle, D.2
-
15
-
-
34547981855
-
Containing the ultimate trojan horse
-
DOI 10.1109/MSP.2007.77
-
M. Franz. Containing the ultimate Trojan Horse. IEEE Security and Privacy, 5(4):64-68, July 2007. (Pubitemid 47274800)
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.4
, pp. 52-56
-
-
Franz, M.1
-
16
-
-
66249138690
-
Eliminating trust from application programs by way of software architecture
-
February, number 121 in Lecture Notes in Informatics
-
M. Franz. Eliminating trust from application programs by way of software architecture. In Proceedings of Software Engineering 2008 (SE 2008), number 121 in Lecture Notes in Informatics, pages 112-126, February 2008.
-
(2008)
Proceedings of Software Engineering 2008 (SE 2008)
, pp. 112-126
-
-
Franz, M.1
-
17
-
-
33846310068
-
Dynamic taint propagation for Java
-
DOI 10.1109/CSAC.2005.21, 1565257, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
-
V. Haldar, D. Chandra, and M. Franz. Dynamic taint propagation for Java. In Twenty-First Annual Computer Security Applications Conference (ACSAC 2005), pages 274- 282. IEEE Computer Society Publications, December 2005. (Pubitemid 46116486)
-
(2005)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, vol.2005
, pp. 303-311
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
19
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing web application code by static analysis and runtime protection. In WWW '04: Proceedings of the 13th international World Wide Web conference, pages 40- 52, 2004.
-
(2004)
WWW '04: Proceedings of the 13th international World Wide Web conference
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
22
-
-
0000046942
-
A security flow control algorithm and its denotational semantics correctness proof
-
A
-
M. Mizuno and D. A. Schmidt. A security flow control algorithm and its denotational semantics correctness proof. Formal Aspects of Computing, 4(6A):727-754, 1992.
-
(1992)
Formal Aspects of Computing
, vol.4
, Issue.6
, pp. 727-754
-
-
Mizuno, M.1
Schmidt, D.A.2
-
25
-
-
48649105822
-
Secure multilevel virtual computer systems
-
Bedford, Massachussetts
-
R. Rhode. Secure multilevel virtual computer systems. Technical Report ESD-TR-74-370, MITRE Corp., Bedford, Massachussetts, 1975.
-
(1975)
Technical Report ESD-TR-74-370, MITRE Corp
-
-
Rhode, R.1
-
26
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In 10th USENIX Security Symposium, pages 201-220, 2001.
-
(2001)
10th USENIX Security Symposium
, pp. 201-220
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
27
-
-
21644475650
-
Rifle: An architectural framework for user-centric information-flow security
-
December
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. Rifle: An architectural framework for user-centric information-flow security. In 37th International Symposium on Microarchitecture, December 2004.
-
(2004)
37th International Symposium on Microarchitecture
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
28
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
29
-
-
0016649031
-
Secure computer operation with virtual machine partitioning
-
California
-
C. Weissman. Secure computer operation with virtual machine partitioning. In National Computer Conference, May 19-22, 1975, Anaheim, California, pages 929-934, 1975.
-
(1975)
National Computer Conference, May 19-22, 1975, Anaheim
, pp. 929-934
-
-
Weissman, C.1
|