-
1
-
-
84869641500
-
-
Auction Sniper. http://www.auctionsniper.com.
-
Auction Sniper
-
-
-
2
-
-
33644633651
-
-
Google Maps API. http://code.google.com/apis/maps.
-
Google Maps API
-
-
-
4
-
-
34548715313
-
Gradual release: Unifying declassification, encryption and key release policies
-
May
-
A. Askarov and A. Sabelfeld. Gradual release: Unifying declassification, encryption and key release policies. In Proc. IEEE Symp. on Security and Privacy, pages 207-221, May 2007.
-
(2007)
Proc. IEEE Symp. on Security and Privacy
, pp. 207-221
-
-
Askarov, A.1
Sabelfeld, A.2
-
6
-
-
70350552264
-
-
A. Askarov and A. Sabelfeld. Tight enforcement of information-release policies for dynamic languages. Technical report, 2009. Located at http://www.cs. cornell.edu/~aslan/csf09-full.pdf.
-
A. Askarov and A. Sabelfeld. Tight enforcement of information-release policies for dynamic languages. Technical report, 2009. Located at http://www.cs. cornell.edu/~aslan/csf09-full.pdf.
-
-
-
-
7
-
-
50249109550
-
-
A. Banerjee, D. Naumann, and S. Rosenberg. Expressive declassification policies and modular static enforcement. In roc. IEEE Symp. on Security and Privacy, pages 339-353, May 2008.
-
A. Banerjee, D. Naumann, and S. Rosenberg. Expressive declassification policies and modular static enforcement. In roc. IEEE Symp. on Security and Privacy, pages 339-353, May 2008.
-
-
-
-
9
-
-
67650663465
-
Secure information flow as a safety property
-
Formal Aspects in Security and Trust, Third International Workshop FAST'08, Springer-Verlag, March
-
G. Boudol. Secure information flow as a safety property. In Formal Aspects in Security and Trust, Third International Workshop (FAST'08), LNCS, pages 20-34. Springer-Verlag, March 2009.
-
(2009)
LNCS
, pp. 20-34
-
-
Boudol, G.1
-
10
-
-
48649085342
-
Fine-grained information flow analysis and enforcement in a java virtual machine
-
December
-
D. Chandra and M. Franz. Fine-grained information flow analysis and enforcement in a java virtual machine. In Proc. Annual Computer Security Applications Conference, pages 463-475, December 2007.
-
(2007)
Proc. Annual Computer Security Applications Conference
, pp. 463-475
-
-
Chandra, D.1
Franz, M.2
-
11
-
-
70450092979
-
Secure web applications via automatic partitioning
-
October
-
S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, and X. Zheng. Secure web applications via automatic partitioning. In Proc. ACM Symp. on Operating System Principles, pages 31-44, October 2007.
-
(2007)
Proc. ACM Symp. on Operating System Principles
, pp. 31-44
-
-
Chong, S.1
Liu, J.2
Myers, A.C.3
Qi, X.4
Vikram, K.5
Zheng, L.6
Zheng, X.7
-
12
-
-
84877700103
-
Sif: Enforcing confidentiality and integrity in web applications
-
August
-
S. Chong, K. Vikram, and A. C. Myers. Sif: Enforcing confidentiality and integrity in web applications. In Proc. USENIX Security Symposium, pages 1-16, August 2007.
-
(2007)
Proc. USENIX Security Symposium
, pp. 1-16
-
-
Chong, S.1
Vikram, K.2
Myers, A.C.3
-
15
-
-
0033718531
-
Confidentiality for mobile code: The case of a simple payment protocol
-
July
-
M. Dam and P. Giambiagi. Confidentiality for mobile code: The case of a simple payment protocol. In Proc. IEEE Computer Security Foundations Workshop, pages 233-244, July 2000.
-
(2000)
Proc. IEEE Computer Security Foundations Workshop
, pp. 233-244
-
-
Dam, M.1
Giambiagi, P.2
-
16
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
17
-
-
77955211190
-
-
Technical Report, University of Paris 12, LACL, 2006
-
C. Dima, C. Enea, and R. Gramatovici. Nondeterminis-tic nointerference and deducible information flow. Technical Report 2006-01, University of Paris 12, LACL, 2006.
-
(2001)
Nondeterminis-tic nointerference and deducible information flow
-
-
Dima, C.1
Enea, C.2
Gramatovici, R.3
-
19
-
-
0016382977
-
Memoryless subsystems
-
May
-
J. S. Fenton. Memoryless subsystems. Computing J., 17(2):143-147, May 1974.
-
(1974)
Computing J
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
21
-
-
33745957768
-
Trusted declassification:: High-level policy for a security-typed language
-
June
-
B. Hicks, D. King, P. McDaniel, and M. Hicks. Trusted declassification:: high-level policy for a security-typed language. In Proc. ACM Workshop on Programming Languages and Analysis for Security (PLAS), pages 65-74, June 2006.
-
(2006)
Proc. ACM Workshop on Programming Languages and Analysis for Security (PLAS)
, pp. 65-74
-
-
Hicks, B.1
King, D.2
McDaniel, P.3
Hicks, M.4
-
22
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
May
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing web application code by static analysis and runtime protection. In Proc. International Conference on World Wide Web, pages 40-52, May 2004.
-
(2004)
Proc. International Conference on World Wide Web
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
23
-
-
35048820041
-
Automaton-based confidentiality monitoring of concurrent programs
-
July
-
G. Le Guernic. Automaton-based confidentiality monitoring of concurrent programs. In Proc. IEEE Computer Security Foundations Symposium, pages 218-232, July 2007.
-
(2007)
Proc. IEEE Computer Security Foundations Symposium
, pp. 218-232
-
-
Le Guernic, G.1
-
24
-
-
49949102660
-
Automata-based confidentiality monitoring
-
Proc. Asian Computing Science Conference ASIAN'06, of, Springer-Verlag
-
G. Le Guernic, A. Banerjee, T. Jensen, and D. Schmidt. Automata-based confidentiality monitoring. In Proc. Asian Computing Science Conference (ASIAN'06), volume 4435 of LNCS. Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.4435
-
-
Le Guernic, G.1
Banerjee, A.2
Jensen, T.3
Schmidt, D.4
-
25
-
-
37149055443
-
Controlling the what and where of declassification in language-based security
-
Proc. European Symp. on Programming, of, Springer-Verlag, March
-
H. Mantel and A. Reinhard. Controlling the what and where of declassification in language-based security. In Proc. European Symp. on Programming, volume 4421 of LNCS, pages 141-156. Springer-Verlag, March 2007.
-
(2007)
LNCS
, vol.4421
, pp. 141-156
-
-
Mantel, H.1
Reinhard, A.2
-
28
-
-
70350521940
-
-
A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001-2006.
-
A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001-2006.
-
-
-
-
31
-
-
70350537315
-
-
A. Russo, A. Sabelfeld, and A. Chudnov. Tracking information flow in dynamic tree structures, April 2009. Draft.
-
A. Russo, A. Sabelfeld, and A. Chudnov. Tracking information flow in dynamic tree structures, April 2009. Draft.
-
-
-
-
33
-
-
35048828759
-
A model for delimited information release
-
Proc. International Symp. on Software Security ISSS'03, of, Springer-Verlag, October
-
A. Sabelfeld and A. C. Myers. A model for delimited information release. In Proc. International Symp. on Software Security (ISSS'03), volume 3233 of LNCS, pages 174-191. Springer-Verlag, October 2004.
-
(2004)
LNCS
, vol.3233
, pp. 174-191
-
-
Sabelfeld, A.1
Myers, A.C.2
-
34
-
-
84860313876
-
From dynamic to static and back: Riding the roller coaster of information-flow control research
-
Proc. Andrei Ershov International Conference on Perspectives of System Informatics, Springer-Verlag, June
-
A. Sabelfeld and A. Russo. From dynamic to static and back: Riding the roller coaster of information-flow control research. In Proc. Andrei Ershov International Conference on Perspectives of System Informatics, LNCS. Springer-Verlag, June 2009.
-
(2009)
LNCS
-
-
Sabelfeld, A.1
Russo, A.2
-
36
-
-
70350548311
-
Declassification: Dimensions and principles
-
To appear
-
A. Sabelfeld and D. Sands. Declassification: Dimensions and principles. J. Computer Security, 2009. To appear.
-
(2009)
J. Computer Security
-
-
Sabelfeld, A.1
Sands, D.2
-
42
-
-
85008603199
-
Provably correct runtime enforcement of noninterference properties
-
Springer-Verlag, December
-
V. N. Venkatakrishnan, W. Xu, D. C. DuVarney, and R. Sekar. Provably correct runtime enforcement of noninterference properties. In Proc. International Conference on Information and Communications Security, pages 332-351. Springer-Verlag, December 2006.
-
(2006)
Proc. International Conference on Information and Communications Security
, pp. 332-351
-
-
Venkatakrishnan, V.N.1
Xu, W.2
DuVarney, D.C.3
Sekar, R.4
-
43
-
-
84887309913
-
Cross site scripting prevention with dynamic data tainting and static analysis
-
February
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross site scripting prevention with dynamic data tainting and static analysis. In Proc. Network and Distributed System Security Symposium, February 2007.
-
(2007)
Proc. Network and Distributed System Security Symposium
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
44
-
-
84957709924
-
Safety versus secrecy
-
Proc. Symp. on Static Analysis, of, Springer-Verlag, September
-
D. Volpano. Safety versus secrecy. In Proc. Symp. on Static Analysis, volume 1694 of LNCS, pages 303-311. Springer-Verlag, September 1999.
-
(1999)
LNCS
, vol.1694
, pp. 303-311
-
-
Volpano, D.1
-
46
-
-
33846497980
-
Javascript instrumentation for browser security
-
ACM
-
D. Yu, A. Chander, N. Islam, and I. Serikov. Javascript instrumentation for browser security. In Proc. ACM Symp. on Principles of Programming Languages, pages 237-249. ACM, 2007.
-
(2007)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 237-249
-
-
Yu, D.1
Chander, A.2
Islam, N.3
Serikov, I.4
|