-
1
-
-
0032681509
-
A core calculus of dependency
-
San Antonio, TX, USA, January
-
M. Abadi, A. Banerjee, N. Heintze and J. Riecke, A core calculus of dependency, in: Proceedings of the Twenty-Sixth ACM Symposium on Principles of Programming Languages, San Antonio, TX, USA, January 1999, pp. 147-160.
-
(1999)
Proceedings of the Twenty-Sixth ACM Symposium on Principles of Programming Languages
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.4
-
2
-
-
0032068338
-
The switchware active network architecture
-
D. Alexander, W. Arbaugh, M. Hicks, P. Kakkar, A. Keromytis, J. Moore, C. Gunder, S. Nettles and J. Smith, The switchware active network architecture, IEEE Network (1998).
-
(1998)
IEEE Network
-
-
Alexander, D.1
Arbaugh, W.2
Hicks, M.3
Kakkar, P.4
Keromytis, A.5
Moore, J.6
Gunder, C.7
Nettles, S.8
Smith, J.9
-
3
-
-
0040229814
-
TAME: A specialized specification and verification system for timed automata
-
A. Bestavros, ed., Washington, DC, USA
-
M. Archer and C. Heitmeyer, TAME: A specialized specification and verification system for timed automata, in: Work In Progress (WIP) Proceedings of the 17th IEEE Real-Time Systems Symposium (RTSS'96), A. Bestavros, ed., Washington, DC, USA, 1996, pp. 3-6.
-
(1996)
Work in Progress (WIP) Proceedings of the 17th IEEE Real-Time Systems Symposium (RTSS'96)
, pp. 3-6
-
-
Archer, M.1
Heitmeyer, C.2
-
5
-
-
0003400251
-
-
Technical Report M74-244, The MITRE Corp., Bedford, MA, USA, May
-
D. Bell and L. LaPadula, Secure computer systems: Mathematical foundations and model, Technical Report M74-244, The MITRE Corp., Bedford, MA, USA, May 1973.
-
(1973)
Secure Computer Systems: Mathematical Foundations and Model
-
-
Bell, D.1
Lapadula, L.2
-
6
-
-
0024772234
-
Kit: A study in operating system verification
-
W.R. Bevier, Kit: A study in operating system verification, IEEE Transactions on Software Engineering 15(11) (1989), 1382-1396.
-
(1989)
IEEE Transactions on Software Engineering
, vol.15
, Issue.11
, pp. 1382-1396
-
-
Bevier, W.R.1
-
7
-
-
0004096238
-
-
2nd edn, Prentice-Hall Series in Computer Science, Prentice-Hall Europe, London, UK
-
R. Bird, Introduction to Functional Programming using Haskell, 2nd edn, Prentice-Hall Series in Computer Science, Prentice-Hall Europe, London, UK, 1998.
-
(1998)
Introduction to Functional Programming Using Haskell
-
-
Bird, R.1
-
8
-
-
84961731134
-
The Horus and Ensemble projects: Accomplishments and limitations
-
K. Birman, R. Constable, M. Hayden, C. Kreitz, O. Rodeh, R. van Renesse andW. Vogels, The Horus and Ensemble projects: Accomplishments and limitations, in: Proceedings of the DARPA Information Survivability Conference & Exposition (DISCEX'00), 2000.
-
(2000)
Proceedings of the DARPA Information Survivability Conference & Exposition (DISCEX'00)
-
-
Birman, K.1
Constable, R.2
Hayden, M.3
Kreitz, C.4
Rodeh, O.5
Van Renesse, R.6
Vogels, W.7
-
11
-
-
0017517624
-
Certification of programs for secure information flow
-
D. Denning and P. Denning, Certification of programs for secure information flow, Communications of the ACM 20(7) (1977), 504-513.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.1
Denning, P.2
-
12
-
-
0004059519
-
-
PhD thesis, Columbia University
-
D. Espinosa, Semantic Lego, PhD thesis, Columbia University, 1995.
-
(1995)
Semantic Lego
-
-
Espinosa, D.1
-
15
-
-
24644453685
-
Adjoining declassification and attack models by abstract interpretation
-
Springer-Verlag
-
R. Giacobazzi and I. Mastroeni, Adjoining declassification and attack models by abstract interpretation, in: European Symposium on Programming (ESOP'05), LNCS, Vol.3444, Springer-Verlag, 2005, pp. 295-310.
-
(2005)
European Symposium on Programming (ESOP'05), LNCS
, vol.3444
, pp. 295-310
-
-
Giacobazzi, R.1
Mastroeni, I.2
-
17
-
-
77952413395
-
Security policies and security models
-
Los Alamitos, CA, USA, April 1990, IEEE Computer Society Press
-
J.A. Goguen and J. Meseguer, Security policies and security models, in: Proceedings of the 1982 Symposium on Security and Privacy (SSP'82), Los Alamitos, CA, USA, April 1990, IEEE Computer Society Press, 1990, pp. 11-20.
-
(1990)
Proceedings of the 1982 Symposium on Security and Privacy (SSP'82)
, pp. 11-20
-
-
Goguen, J.A.1
Meseguer, J.2
-
21
-
-
33745212062
-
A principled approach to operating system construction in Haskell
-
ACM Press, New York, NY
-
T. Hallgren, M.P. Jones, R. Leslie and A. Tolmach, A principled approach to operating system construction in haskell, in: Proceedings of the Tenth ACM SIGPLAN International Conference on Functional Programming (ICFP05), ACM Press, New York, NY, 2005, pp. 116-128.
-
(2005)
Proceedings of the Tenth ACM SIGPLAN International Conference on Functional Programming (ICFP05)
, pp. 116-128
-
-
Hallgren, T.1
Jones, M.P.2
Leslie, R.3
Tolmach, A.4
-
22
-
-
28144458250
-
-
Technical Report CMU-CS-98-107, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, USA, January
-
R. Harper, P. Lee and F. Pfenning, The Fox project: Advanced language technology for extensible systems, Technical Report CMU-CS-98-107, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, USA, January 1998.
-
(1998)
The Fox Project: Advanced Language Technology for Extensible Systems
-
-
Harper, R.1
Lee, P.2
Pfenning, F.3
-
26
-
-
48949100677
-
Asynchronous exceptions as an effect
-
W. Harrison, G. Allwein, A. Gill and A. Procter, Asynchronous exceptions as an effect, in: Proceedings of the 9th International Conference on the Mathematics of Program Construction (MPC08), LNCS, Vol.5133, 2008, pp. 153-176.
-
(2008)
Proceedings of the 9th International Conference on the Mathematics of Program Construction (MPC08), LNCS
, vol.5133
, pp. 153-176
-
-
Harrison, W.1
Allwein, G.2
Gill, A.3
Procter, A.4
-
27
-
-
84976498283
-
Metacomputation-based compiler architecture
-
Springer-Verlag
-
W. Harrison and S. Kamin, Metacomputation-based compiler architecture, in: 5th International Conference on the Mathematics of Program Construction, Ponte de Lima, Portugal, LNCS, Vol.1837, Springer-Verlag, 2000, pp. 213-229.
-
(2000)
5th International Conference on the Mathematics of Program Construction, Ponte de Lima, Portugal, LNCS
, vol.1837
, pp. 213-229
-
-
Harrison, W.1
Kamin, S.2
-
28
-
-
0031701347
-
The SLam calculus: Programming with secrecy and integrity
-
ACM Press, New York, NY
-
N. Heintze and J. Riecke, The SLam calculus: programming with secrecy and integrity, in: Proceedings of the Twenty-fifth ACM Symposium on Principles of Programming Languages, ACM Press, New York, NY, 1998, pp. 365-377.
-
(1998)
Proceedings of the Twenty-fifth ACM Symposium on Principles of Programming Languages
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.2
-
29
-
-
34547321335
-
Formal specification and verification of data separation in a separation kernel for an embedded system
-
ACM Press, New York, NY
-
C.L. Heitmeyer, M. Archer, E.I. Leonard and J. McLean, Formal specification and verification of data separation in a separation kernel for an embedded system, in: CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security, ACM Press, New York, NY, 2006, pp. 346-355.
-
(2006)
CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 346-355
-
-
Heitmeyer, C.L.1
Archer, M.2
Leonard, E.I.3
McLean, J.4
-
30
-
-
26844476419
-
Axiomatic constructor classes in isabelle/holcf
-
Springer-Verlag
-
B. Huffman, J. Matthews and P. White, Axiomatic constructor classes in isabelle/holcf, in: 18th International Conference on Theorem Proving in Higher Order Logics (TPHOL05), LNCS, Vol.3603, Springer-Verlag, 2005, pp. 147-162.
-
(2005)
18th International Conference on Theorem Proving in Higher Order Logics (TPHOL05), LNCS
, vol.3603
, pp. 147-162
-
-
Huffman, B.1
Matthews, J.2
White, P.3
-
31
-
-
0033751850
-
A semantic approach to secure information flow
-
R. Joshi and K. Leino, A semantic approach to secure information flow, Science of Computer Programming 37(1-3) (2000), 113-138.
-
(2000)
Science of Computer Programming
, vol.37
, Issue.1-3
, pp. 113-138
-
-
Joshi, R.1
Leino, K.2
-
32
-
-
0031124371
-
An industrial strength theorem prover for a logic based on common lisp
-
M. Kaufmann and J.S. Moore, An industrial strength theorem prover for a logic based on common lisp, IEEE Transactions on Software Engineering 23(4) (1997), 203-213.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.4
, pp. 203-213
-
-
Kaufmann, M.1
Moore, J.S.2
-
33
-
-
0015672289
-
A note on the confinement problem
-
October 1973, ACM press
-
B. Lampson, A note on the confinement problem, in: Communications of the ACM, October 1973, ACM press, 1973, pp. 613-615.
-
(1973)
Communications of the ACM
, pp. 613-615
-
-
Lampson, B.1
-
36
-
-
0029203616
-
Monad transformers and modular interpreters
-
ACM Press
-
S. Liang, P. Hudak and M. Jones, Monad transformers and modular interpreters, in: 22nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1995, ACM Press, 1995, pp. 333-343.
-
(1995)
22nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1995
, pp. 333-343
-
-
Liang, S.1
Hudak, P.2
Jones, M.3
-
39
-
-
48249125979
-
Formal construction of the mathematically analyzed separation kernel
-
IEEE Computer Society, Washington, DC
-
W. Martin, P. White, F.S. Taylor and A. Goldberg, Formal construction of the mathematically analyzed separation kernel, in: ASE'00: Proceedings of the 15th IEEE International Conference on Automated Software Engineering, IEEE Computer Society, Washington, DC, 2000, p. 133.
-
(2000)
ASE'00: Proceedings of the 15th IEEE International Conference on Automated Software Engineering
, pp. 133
-
-
Martin, W.1
White, P.2
Taylor, F.S.3
Goldberg, A.4
-
41
-
-
0023829319
-
Noninterference and the composability of security properties
-
D. McCullough, Noninterference and the composability of security properties, in: Proc. IEEE Symposium on Security and Privacy, 1988, pp. 177-187.
-
(1988)
Proc. IEEE Symposium on Security and Privacy
, pp. 177-187
-
-
McCullough, D.1
-
42
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
J. McLean, A general theory of composition for trace sets closed under selective interleaving functions, in: Proceedings of the IEEE Symposium on Research in Security and Privacy, 1994, pp. 79-93.
-
(1994)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 79-93
-
-
McLean, J.1
-
43
-
-
0003444157
-
-
revised edn, The MIT Press, Cambridge, MA
-
R. Milner, M. Tofte, R. Harper and D. MacQueen, The Definition of Standard ML, revised edn, The MIT Press, Cambridge, MA, 1997.
-
(1997)
The Definition of Standard ML
-
-
Milner, R.1
Tofte, M.2
Harper, R.3
MacQueen, D.4
-
44
-
-
0000046942
-
A security flow control algorithm and its denotational semantics correctness proof
-
M. Mizuno and D. Schmidt, A security flow control algorithm and its denotational semantics correctness proof, Formal Aspects of Computing 4(6A) (1992), 727-754.
-
(1992)
Formal Aspects of Computing
, vol.4
, Issue.6 A
, pp. 727-754
-
-
Mizuno, M.1
Schmidt, D.2
-
45
-
-
0024927385
-
Computational lambda-calculus and monads
-
Pacific Grove, CA, USA, 5-8 June, 1989 IEEE Computer Society Press, Washington, DC
-
E. Moggi, Computational lambda-calculus and monads, in: Proceedings 4th Annual IEEE Symp. on Logic in Computer Science, LICS'89, Pacific Grove, CA, USA, 5-8 June, 1989, IEEE Computer Society Press, Washington, DC, 1989, pp. 14-23.
-
(1989)
Proceedings 4th Annual IEEE Symp. on Logic in Computer Science, LICS'89
, pp. 14-23
-
-
Moggi, E.1
-
46
-
-
0003457308
-
-
Technical Report ECS-LFCS-90-113, Dept. of Computer Science, Edinburgh Univ.
-
E. Moggi, An abstract view of programming languages, Technical Report ECS-LFCS-90-113, Dept. of Computer Science, Edinburgh Univ., 1990.
-
(1990)
An Abstract View of Programming Languages
-
-
Moggi, E.1
-
47
-
-
0026188821
-
Notions of computation and monads
-
E. Moggi, Notions of computation and monads, Information and Computation 93(1) (1991), 55-92.
-
(1991)
Information and Computation
, vol.93
, Issue.1
, pp. 55-92
-
-
Moggi, E.1
-
48
-
-
0347229432
-
-
Technical Report CSL-116, SRI, May
-
P. Neumann, R. Boyer, R. Feiertag, K. Levitt and L. Robinson, A provably secure operating system: The system, its applications, and proof, Technical Report CSL-116, SRI, May 1980.
-
(1980)
A Provably Secure Operating System: The System, Its Applications, and Proof
-
-
Neumann, P.1
Boyer, R.2
Feiertag, R.3
Levitt, K.4
Robinson, L.5
-
49
-
-
0348126394
-
Isabelle/HOL - A Proof Assistant for Higher-Order Logic
-
Springer
-
T. Nipkow, L.C. Paulson and M.Wenzel, Isabelle/HOL - A Proof Assistant for Higher-Order Logic, LNCS, Vol.2283, Springer, 2002.
-
(2002)
LNCS
, vol.2283
-
-
Nipkow, T.1
Paulson, L.C.2
Wenzel, M.3
-
50
-
-
1442263137
-
Separation and information hiding
-
ACM Press
-
P. O'Hearn, H. Yang and J. Reynolds, Separation and information hiding, in: Proceedings of the 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, ACM Press, 2004, pp. 268-280.
-
(2004)
Proceedings of the 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 268-280
-
-
O'Hearn, P.1
Yang, H.2
Reynolds, J.3
-
51
-
-
84944677742
-
PVS: A Prototype Verification System
-
Proc. of 11th International Conference on Automated Deduction, D. Kapur, ed., Saratoga, NY, USA, June 1992, Springer-Verlag
-
S. Owre, J. Rushby and N. Shankar, PVS: A Prototype Verification System, in: Proc. of 11th International Conference on Automated Deduction, D. Kapur, ed., Lecture Notes in Artificial Intelligence, Vol.607, Saratoga, NY, USA, June 1992, Springer-Verlag, 1992, pp. 748-752.
-
(1992)
Lecture Notes in Artificial Intelligence
, vol.607
, pp. 748-752
-
-
Owre, S.1
Rushby, J.2
Shankar, N.3
-
53
-
-
18844483225
-
A resumption monad transformer and its applications in the semantics of concurrency
-
(an expanded technical report is available from the author by request)
-
N. Papaspyrou, A resumption monad transformer and its applications in the semantics of concurrency, in: Proceedings of the 3rd Panhellenic Logic Symposium, 2001 (an expanded technical report is available from the author by request).
-
(2001)
Proceedings of the 3rd Panhellenic Logic Symposium
-
-
Papaspyrou, N.1
-
57
-
-
0036037318
-
Information flow inference for ML
-
Portland, OR, USA, January
-
F. Pottier and V. Simonet, Information flow inference for ML, in: Proceedings of the 29th ACM Symposium on Principles of Programming Languages, Portland, OR, USA, January 2002, pp. 319- 330.
-
(2002)
Proceedings of the 29th ACM Symposium on Principles of Programming Languages
, pp. 319-330
-
-
Pottier, F.1
Simonet, V.2
-
58
-
-
70449373311
-
-
Programatica Home Page
-
Programatica Home Page, www.cse.ogi.edu/PacSoft/projects/programatica.
-
-
-
-
60
-
-
0020919435
-
Types, abstraction and parametric polymorphism
-
R.E.A. Mason, ed., North-Holland
-
J. Reynolds, Types, abstraction and parametric polymorphism, in: Information Processing 83, R.E.A. Mason, ed., North-Holland, 1983, pp. 513-523.
-
(1983)
Information Processing
, vol.83
, pp. 513-523
-
-
Reynolds, J.1
-
64
-
-
0020273088
-
Proof of separability: A verification technique for a class of security kernels
-
Springer-Verlag, Berlin
-
J. Rushby, Proof of separability: A verification technique for a class of security kernels, in: Proceedings of the 5th International Symposium on Programming, Springer-Verlag, Berlin, 1982, pp. 352- 362.
-
(1982)
Proceedings of the 5th International Symposium on Programming
, pp. 352-362
-
-
Rushby, J.1
-
67
-
-
0001421170
-
EROS: A fast capability system
-
Charleston, SC, USA, December
-
J. Shapiro, J. Smith and D. Farber, EROS: a fast capability system, in: Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP'99), Charleston, SC, USA, December 1999, pp. 170-185.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP'99)
, pp. 170-185
-
-
Shapiro, J.1
Smith, J.2
Farber, D.3
-
68
-
-
0034835461
-
A new type system for secure information flow
-
IEEE Computer Society Press, June
-
G. Smith, A new type system for secure information flow, in: 14th IEEE Computer Security Foundations Workshop (CSFW'01), IEEE Computer Society Press, June 2001, pp. 115-125.
-
(2001)
14th IEEE Computer Security Foundations Workshop (CSFW'01)
, pp. 115-125
-
-
Smith, G.1
-
69
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
San Diego, CA, USA, January
-
G. Smith and D. Volpano, Secure information flow in a multi-threaded imperative language, in: Proceedings of the 25th ACM Symposium on Principles of Programming Languages, San Diego, CA, USA, January 1998, pp. 355-364.
-
(1998)
Proceedings of the 25th ACM Symposium on Principles of Programming Languages
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
70
-
-
70449421855
-
-
SPECWARE Home Page
-
SPECWARE Home Page, http://www.specware.org/.
-
-
-
-
73
-
-
0002604569
-
The essence of functional programming
-
Albuquerque, NM, USA, January 19-22, 1992, ACM Press
-
P. Wadler, The essence of functional programming, in: Proceedings of the 19th Symposium on Principles of Programming Languages, Albuquerque, NM, USA, January 19-22, 1992, ACM Press, 1992, pp. 11-14.
-
(1992)
Proceedings of the 19th Symposium on Principles of Programming Languages
, pp. 11-14
-
-
Wadler, P.1
-
74
-
-
84955607329
-
Monads for functional programming
-
P. Wadler, Monads for functional programming, in: Proceedings of the 1992 Marktoberdorf International Summer School on Logic of Computation, LNCS, Vol.925, 1995, pp. 24-52.
-
(1995)
Proceedings of the 1992 Marktoberdorf International Summer School on Logic of Computation, LNCS
, vol.925
, pp. 24-52
-
-
Wadler, P.1
-
75
-
-
0018983212
-
Specification and verification of the UCLA Unix security kernel
-
B. Walker, R. Kemmerer and G. Popek, Specification and verification of the UCLA Unix security kernel, Communications of the ACM 23(2) (1980), 118-131.
-
(1980)
Communications of the ACM
, vol.23
, Issue.2
, pp. 118-131
-
-
Walker, B.1
Kemmerer, R.2
Popek, G.3
-
77
-
-
0034822370
-
Robust declassification
-
Cape Breton, NS, Canada, June
-
S. Zdancewic and A. Myers, Robust declassification, in: Proceedings of 14th IEEE Computer Security Foundations Workshop, Cape Breton, NS, Canada, June 2001, pp. 15-23.
-
(2001)
Proceedings of 14th IEEE Computer Security Foundations Workshop
, pp. 15-23
-
-
Zdancewic, S.1
Myers, A.2
|