메뉴 건너뛰기




Volumn , Issue , 2009, Pages 43-59

Tight enforcement of information-release policies for dynamic languages

Author keywords

[No Author keywords available]

Indexed keywords

CODE EVALUATION; COMMUNICATION PRIMITIVES; DYNAMIC LANGUAGES; ENFORCEMENT MECHANISMS; HYBRID MECHANISMS; ON-THE-FLY; POLICY FRAMEWORK; SECURITY POLICY;

EID: 70350542799     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2009.22     Document Type: Conference Paper
Times cited : (117)

References (46)
  • 1
    • 84869641500 scopus 로고    scopus 로고
    • Auction Sniper. http://www.auctionsniper.com.
    • Auction Sniper
  • 2
    • 33644633651 scopus 로고    scopus 로고
    • Google Maps API. http://code.google.com/apis/maps.
    • Google Maps API
  • 4
    • 34548715313 scopus 로고    scopus 로고
    • Gradual release: Unifying declassification, encryption and key release policies
    • May
    • A. Askarov and A. Sabelfeld. Gradual release: Unifying declassification, encryption and key release policies. In Proc. IEEE Symp. on Security and Privacy, pages 207-221, May 2007.
    • (2007) Proc. IEEE Symp. on Security and Privacy , pp. 207-221
    • Askarov, A.1    Sabelfeld, A.2
  • 6
    • 70350552264 scopus 로고    scopus 로고
    • A. Askarov and A. Sabelfeld. Tight enforcement of information-release policies for dynamic languages. Technical report, 2009. Located at http://www.cs. cornell.edu/~aslan/csf09-full.pdf.
    • A. Askarov and A. Sabelfeld. Tight enforcement of information-release policies for dynamic languages. Technical report, 2009. Located at http://www.cs. cornell.edu/~aslan/csf09-full.pdf.
  • 7
    • 50249109550 scopus 로고    scopus 로고
    • A. Banerjee, D. Naumann, and S. Rosenberg. Expressive declassification policies and modular static enforcement. In roc. IEEE Symp. on Security and Privacy, pages 339-353, May 2008.
    • A. Banerjee, D. Naumann, and S. Rosenberg. Expressive declassification policies and modular static enforcement. In roc. IEEE Symp. on Security and Privacy, pages 339-353, May 2008.
  • 9
    • 67650663465 scopus 로고    scopus 로고
    • Secure information flow as a safety property
    • Formal Aspects in Security and Trust, Third International Workshop FAST'08, Springer-Verlag, March
    • G. Boudol. Secure information flow as a safety property. In Formal Aspects in Security and Trust, Third International Workshop (FAST'08), LNCS, pages 20-34. Springer-Verlag, March 2009.
    • (2009) LNCS , pp. 20-34
    • Boudol, G.1
  • 10
    • 48649085342 scopus 로고    scopus 로고
    • Fine-grained information flow analysis and enforcement in a java virtual machine
    • December
    • D. Chandra and M. Franz. Fine-grained information flow analysis and enforcement in a java virtual machine. In Proc. Annual Computer Security Applications Conference, pages 463-475, December 2007.
    • (2007) Proc. Annual Computer Security Applications Conference , pp. 463-475
    • Chandra, D.1    Franz, M.2
  • 12
    • 84877700103 scopus 로고    scopus 로고
    • Sif: Enforcing confidentiality and integrity in web applications
    • August
    • S. Chong, K. Vikram, and A. C. Myers. Sif: Enforcing confidentiality and integrity in web applications. In Proc. USENIX Security Symposium, pages 1-16, August 2007.
    • (2007) Proc. USENIX Security Symposium , pp. 1-16
    • Chong, S.1    Vikram, K.2    Myers, A.C.3
  • 15
    • 0033718531 scopus 로고    scopus 로고
    • Confidentiality for mobile code: The case of a simple payment protocol
    • July
    • M. Dam and P. Giambiagi. Confidentiality for mobile code: The case of a simple payment protocol. In Proc. IEEE Computer Security Foundations Workshop, pages 233-244, July 2000.
    • (2000) Proc. IEEE Computer Security Foundations Workshop , pp. 233-244
    • Dam, M.1    Giambiagi, P.2
  • 16
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 19
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • May
    • J. S. Fenton. Memoryless subsystems. Computing J., 17(2):143-147, May 1974.
    • (1974) Computing J , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 23
    • 35048820041 scopus 로고    scopus 로고
    • Automaton-based confidentiality monitoring of concurrent programs
    • July
    • G. Le Guernic. Automaton-based confidentiality monitoring of concurrent programs. In Proc. IEEE Computer Security Foundations Symposium, pages 218-232, July 2007.
    • (2007) Proc. IEEE Computer Security Foundations Symposium , pp. 218-232
    • Le Guernic, G.1
  • 24
    • 49949102660 scopus 로고    scopus 로고
    • Automata-based confidentiality monitoring
    • Proc. Asian Computing Science Conference ASIAN'06, of, Springer-Verlag
    • G. Le Guernic, A. Banerjee, T. Jensen, and D. Schmidt. Automata-based confidentiality monitoring. In Proc. Asian Computing Science Conference (ASIAN'06), volume 4435 of LNCS. Springer-Verlag, 2006.
    • (2006) LNCS , vol.4435
    • Le Guernic, G.1    Banerjee, A.2    Jensen, T.3    Schmidt, D.4
  • 25
    • 37149055443 scopus 로고    scopus 로고
    • Controlling the what and where of declassification in language-based security
    • Proc. European Symp. on Programming, of, Springer-Verlag, March
    • H. Mantel and A. Reinhard. Controlling the what and where of declassification in language-based security. In Proc. European Symp. on Programming, volume 4421 of LNCS, pages 141-156. Springer-Verlag, March 2007.
    • (2007) LNCS , vol.4421 , pp. 141-156
    • Mantel, H.1    Reinhard, A.2
  • 28
    • 70350521940 scopus 로고    scopus 로고
    • A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001-2006.
    • A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001-2006.
  • 31
    • 70350537315 scopus 로고    scopus 로고
    • A. Russo, A. Sabelfeld, and A. Chudnov. Tracking information flow in dynamic tree structures, April 2009. Draft.
    • A. Russo, A. Sabelfeld, and A. Chudnov. Tracking information flow in dynamic tree structures, April 2009. Draft.
  • 33
    • 35048828759 scopus 로고    scopus 로고
    • A model for delimited information release
    • Proc. International Symp. on Software Security ISSS'03, of, Springer-Verlag, October
    • A. Sabelfeld and A. C. Myers. A model for delimited information release. In Proc. International Symp. on Software Security (ISSS'03), volume 3233 of LNCS, pages 174-191. Springer-Verlag, October 2004.
    • (2004) LNCS , vol.3233 , pp. 174-191
    • Sabelfeld, A.1    Myers, A.C.2
  • 34
    • 84860313876 scopus 로고    scopus 로고
    • From dynamic to static and back: Riding the roller coaster of information-flow control research
    • Proc. Andrei Ershov International Conference on Perspectives of System Informatics, Springer-Verlag, June
    • A. Sabelfeld and A. Russo. From dynamic to static and back: Riding the roller coaster of information-flow control research. In Proc. Andrei Ershov International Conference on Perspectives of System Informatics, LNCS. Springer-Verlag, June 2009.
    • (2009) LNCS
    • Sabelfeld, A.1    Russo, A.2
  • 36
    • 70350548311 scopus 로고    scopus 로고
    • Declassification: Dimensions and principles
    • To appear
    • A. Sabelfeld and D. Sands. Declassification: Dimensions and principles. J. Computer Security, 2009. To appear.
    • (2009) J. Computer Security
    • Sabelfeld, A.1    Sands, D.2
  • 44
    • 84957709924 scopus 로고    scopus 로고
    • Safety versus secrecy
    • Proc. Symp. on Static Analysis, of, Springer-Verlag, September
    • D. Volpano. Safety versus secrecy. In Proc. Symp. on Static Analysis, volume 1694 of LNCS, pages 303-311. Springer-Verlag, September 1999.
    • (1999) LNCS , vol.1694 , pp. 303-311
    • Volpano, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.