-
1
-
-
33749496386
-
A theorem proving approach to analysis of secure information flow
-
Roberto Gorrieri, editor, WITS. IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS
-
Ádám Darvas, Reiner Hähnle, and Dave Sands. A theorem proving approach to analysis of secure information flow. In Roberto Gorrieri, editor, Workshop on Issues in the Theory of Security, WITS. IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS, 2003.
-
(2003)
Workshop on Issues in the Theory of Security
-
-
Darvas, Á.1
Hähnle, R.2
Sands, D.3
-
2
-
-
77953977944
-
The KeY tool
-
To appear
-
Wolfgang Ahrendt, Thomas Baar, Bernhard Beckert, Richard Bubel, Martin Giese, Reiner Hähnle, Wolfram Menzel, Wojciech Mostowski, Andreas Roth, Steffen Schlager, and Peter H. Schmitt. The KeY tool. Software and System Modeling, 2003. To appear.
-
(2003)
Software and System Modeling
-
-
Ahrendt, W.1
Baar, T.2
Beckert, B.3
Bubel, R.4
Giese, M.5
Hähnle, R.6
Menzel, W.7
Mostowski, W.8
Roth, A.9
Schlager, S.10
Schmitt, P.H.11
-
3
-
-
1542285900
-
Java bytecode verification for secure information flow
-
Marco Avvenuti, Cinzia Bernardeschi, and Nicoletta De Francesco. Java bytecode verification for secure information flow. ACM SIGPLAN Notices, 38(12):20-27, 2003.
-
(2003)
ACM SIGPLAN Notices
, vol.38
, Issue.12
, pp. 20-27
-
-
Avvenuti, M.1
Bernardeschi, C.2
De Francesco, N.3
-
4
-
-
17044429386
-
Stack-Based Access Control for Secure Information Flow
-
200x. Special Issue on Language-Based Security, To appear
-
Anindya Banerjee and David A. Naumann. Stack-Based Access Control for Secure Information Flow. Journal of Functional Programming, 200x. Special Issue on Language-Based Security, To appear.
-
Journal of Functional Programming
-
-
Banerjee, A.1
Naumann, D.A.2
-
5
-
-
84944249026
-
Security Types Preserving Compilation
-
VMCAI'04 Proceedings, Springer, Berlin
-
Giles Barthe, Amitabh Basu, and Tamara Rezk. Security Types Preserving Compilation. In VMCAI'04 Proceedings, LNCS. Springer, Berlin, 2004.
-
(2004)
LNCS
-
-
Barthe, G.1
Basu, A.2
Rezk, T.3
-
8
-
-
13144251735
-
-
Technical Report NIII-R0413, Nijmegen Institute for Computer and Information Sciences, available at
-
David R. Cok and Joseph R. Kiniry. ESC/Java2: Uniting ESC/Java and JML. Technical Report NIII-R0413, Nijmegen Institute for Computer and Information Sciences, 2004. available at http://www.cs.ru.nl/research/reports/info/NIII- R0413.html.
-
(2004)
ESC/Java2: Uniting ESC/Java and JML
-
-
Cok, D.R.1
Kiniry, J.R.2
-
9
-
-
25844442786
-
ESC/Java2: Uniting ESC/Java and JML
-
Proceedings of CASSIS: Construction and Analysis of Safe, Secure and Interoperable Smart devices, Springer-Verlag, to appear. See the associated technical rapport [8]
-
David R. Cok and Joseph R. Kiniry. ESC/Java2: Uniting ESC/Java and JML. In Proceedings of CASSIS: Construction and Analysis of Safe, Secure and Interoperable Smart devices, LNCS. Springer-Verlag, to appear. See the associated technical rapport [8].
-
LNCS
-
-
Cok, D.R.1
Kiniry, J.R.2
-
10
-
-
0001502002
-
Abstract interpretation. Symposium on Models of Programming Languages and Computation
-
June
-
P. Cousot. Abstract interpretation. Symposium on Models of Programming Languages and Computation, ACM Computing Surveys, 28(2):324-328, June 1996.
-
(1996)
ACM Computing Surveys
, vol.28
, Issue.2
, pp. 324-328
-
-
Cousot, P.1
-
11
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
Los Angeles, California, ACM Press, New York, NY
-
P. Cousot and R. Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Conference Record of the Fourth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 238-252, Los Angeles, California, 1977. ACM Press, New York, NY.
-
(1977)
Conference Record of the Fourth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
12
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
May
-
Dorothy E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5), May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
-
-
Denning, D.E.1
-
14
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
Dorothy E. Denning and Peter J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, July 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
15
-
-
77953972229
-
Abstract Non-Interference: Parameterizing Non-Interference by Abstract Interpretation
-
Roberto Giacobazzi and Isabella Mastroeni. Abstract Non-Interference: Parameterizing Non-Interference by Abstract Interpretation. In POPL04 proceedings, 2004.
-
POPL04 Proceedings, 2004
-
-
Giacobazzi, R.1
Mastroeni, I.2
-
16
-
-
0020299523
-
Security policies and security models
-
IEEE Comp. Soc. Press
-
J. Goguen and J. Meseguer. Security policies and security models. In IEEE Symp. on Security and Privacy, pages 11-20. IEEE Comp. Soc. Press, 1982.
-
(1982)
IEEE Symp. on Security and Privacy
, pp. 11-20
-
-
Goguen, J.1
Meseguer, J.2
-
17
-
-
0033751850
-
A semantic approach to secure information flow
-
R. Joshi and K.R.M Leino. A semantic approach to secure information flow. Science of Comput. Progr., 37(1-3):113-138, 2000.
-
(2000)
Science of Comput. Progr.
, vol.37
, Issue.1-3
, pp. 113-138
-
-
Joshi, R.1
Leino, K.R.M.2
-
18
-
-
0015672289
-
A note on the Confinement Problem
-
Butler W. Lampson. A note on the Confinement Problem. Communications of the ACM, 16(10):613-615, 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
20
-
-
0029251055
-
Formal verification for fault-tolerant architectures: Prolegomena to the design of PVS
-
S. Owre, J.M. Rushby, N. Shankar, and F. von Henke. Formal verification for fault-tolerant architectures: Prolegomena to the design of PVS. IEEE Trans. on Softw. Eng., 21(2):107-125, 1995.
-
(1995)
IEEE Trans. on Softw. Eng.
, vol.21
, Issue.2
, pp. 107-125
-
-
Owre, S.1
Rushby, J.M.2
Shankar, N.3
Von Henke, F.4
-
21
-
-
0003267035
-
Isabelle: A Generic Theorem Prover
-
Springer Berlin
-
L.C. Paulson. Isabelle: A Generic Theorem Prover. Number 828 in LNCS. Springer, Berlin, 1994.
-
(1994)
LNCS
, vol.828
-
-
Paulson, L.C.1
-
23
-
-
77954016190
-
-
website
-
The PVS website, http://pvs.csl.sri.com/.
-
-
-
-
26
-
-
0030370740
-
A sound type system for secure flow analysis
-
Dennis Volpano, Geoffrey Smith, and Cynthia Irvine. A sound type system for secure flow analysis. Journal of computer security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
27
-
-
84958749689
-
Security Typings by Abstract Interpretation
-
SAS, Springer-Verlag, September
-
M. Zanotti. Security Typings by Abstract Interpretation. In SAS, volume 2477 of LNCS, pages 360-375. Springer-Verlag, September 2002.
-
(2002)
LNCS
, vol.2477
, pp. 360-375
-
-
Zanotti, M.1
|