-
1
-
-
0015672289
-
A note on the confinement problem
-
B. W. Lampson, "A note on the confinement problem," Comm. the ACM, vol.16, no.10, pp. 613-615, 1973.
-
(1973)
Comm. the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
2
-
-
0037251378
-
Language-based information-flow security
-
A. Sabelfeld and A. C. Myers, "Language-based information-flow security," IEEE J-SAC, vol.21, no.1, pp. 5-19, 2003.
-
(2003)
IEEE J-SAC
, vol.21
, Issue.1
, pp. 5-19
-
-
Sabelfeld, A.1
Myers, A.C.2
-
3
-
-
3543075807
-
An access control framework for business processes for web services
-
H. Koshutanski and F. Massacci, "An access control framework for business processes for web services," in ACM workshop on XML security. 2003, pp. 15-24.
-
(2003)
ACM Workshop on XML Security
, pp. 15-24
-
-
Koshutanski, H.1
Massacci, F.2
-
4
-
-
0028513932
-
Access control: Principles and practice
-
R. Sandhu and P. Samarati, "Access control: Principles and practice," IEEE Comm. Mag., vol.32, no.9, pp. 40-48, 1994.
-
(1994)
IEEE Comm. Mag.
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
5
-
-
0242540392
-
An access control language for web services
-
E. G. Sirer and K. Wang, "An access control language for web services," in ACM SACMAT. 2002, pp. 23-30.
-
(2002)
ACM SACMAT
, pp. 23-30
-
-
Sirer, E.G.1
Wang, K.2
-
6
-
-
84883001875
-
Detective information flow analysis for business processes
-
ser. LNI
-
R. Accorsi and C. Wonnemann, "Detective information flow analysis for business processes," in Business Processes, Services Computing and Intelligent Service Management, ser. LNI, vol.147, 2009, pp .223-224.
-
(2009)
Business Processes, Services Computing and Intelligent Service Management
, vol.147
, pp. 223-224
-
-
Accorsi, R.1
Wonnemann, C.2
-
7
-
-
35348884907
-
Exposing private information by timing web applications
-
A. Bortz, D. Boneh, and P. Nandy, "Exposing private information by timing web applications," in Conf. World Wide Web. 2007, pp. 621-628.
-
(2007)
Conf. World Wide Web
, pp. 621-628
-
-
Bortz, A.1
Boneh, D.2
Nandy, P.3
-
8
-
-
18844454571
-
Remote timing attacks are practical
-
D. Brumley and D. Boneh, "Remote timing attacks are practical," Comp. Net., vol.48, no.5,pp.701-716, 2005.
-
(2005)
Comp. Net.
, vol.48
, Issue.5
, pp. 701-716
-
-
Brumley, D.1
Boneh, D.2
-
9
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," J. of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, no.5, pp. 557-570, 2002.
-
(2002)
J. of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
10
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Apr.
-
K. J. Biba, "Integrity considerations for secure computer systems," The Mitre Corp., Tech. Rep., Apr. 1977.
-
(1977)
The Mitre Corp., Tech. Rep.
-
-
Biba, K.J.1
-
11
-
-
0020299523
-
Security policies and security models
-
J. A. Goguen and J. Meseguer, "Security policies and security models," in IEEE SSP, 1982, pp. 11-20.
-
(1982)
IEEE SSP
, pp. 11-20
-
-
Goguen, J.A.1
Meseguer, J.2
-
14
-
-
57849117582
-
Compliance monitor for early warning risk determination
-
October
-
R. Accorsi, Y. Sato, and S. Kai, "Compliance monitor for early warning risk determination," Wirtschaftsinfor-matik, vol.50, no.5, October 2008 pp. 375-382.
-
(2008)
Wirtschaftsinfor-matik
, vol.50
, Issue.5
, pp. 375-382
-
-
Accorsi, R.1
Sato, Y.2
Kai, S.3
-
16
-
-
49049083502
-
Electronic voting scheme to maintain anonymity in small-scale election by hiding the number of votes
-
T. Endo, I. Echizen, and H. Yoshiura, "Electronic voting scheme to maintain anonymity in small-scale election by hiding the number of votes," in ARES Conference. 2008, pp. 1287-1293.
-
(2008)
ARES Conference
, pp. 1287-1293
-
-
Endo, T.1
Echizen, I.2
Yoshiura, H.3
-
17
-
-
84881225236
-
Enforceable security policies
-
F. Schneider, "Enforceable Security Policies," ACM TISSEC, vol.3, no.1, pp. 30-50, 2000.
-
(2000)
ACM TISSEC
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.1
-
19
-
-
35048880192
-
Dynamic dependency monitoring to secure information flow
-
P. Shroff, S. F. Smith, and M. Thober, "Dynamic dependency monitoring to secure information flow," in IEEE CSF, 2007, pp. 203-217.
-
(2007)
IEEE CSF
, pp. 203-217
-
-
Shroff, P.1
Smith, S.F.2
Thober, M.3
-
20
-
-
24644445710
-
A theorem proving approach to analysis of secure information flow
-
ser. LNCS
-
Á. Darvas, R. Hähnle, and D. Sands, "A theorem proving approach to analysis of secure information flow," SPC, ser. LNCS, vol.3450. 2005, pp. 193-209.
-
(2005)
SPC
, vol.3450
, pp. 193-209
-
-
Darvas, Á.1
Hähnle, R.2
Sands, D.3
-
21
-
-
58049149107
-
Verification condition generation for conditional information flow
-
T. Amtoft and A. Banerjee, "Verification condition generation for conditional information flow," in ACM FMSE. 2007, pp. 2-11.
-
(2007)
ACM FMSE.
, pp. 2-11
-
-
Amtoft, T.1
Banerjee, A.2
-
22
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, C. Irvine, and G. Smith, "A sound type system for secure flow analysis," JCS, vol.4, no.2-3, pp. 167-187, 1996.
-
(1996)
JCS
, vol.4
, Issue.2-3
, pp. 167-187
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
-
23
-
-
34250357872
-
Information flow control for java based on path conditions in dependence graphs
-
C. Hammer, J. Krinke, and G. Snelting, "Information flow control for java based on path conditions in dependence graphs," in IEEE ISSSE. 2006, pp. 87-96.
-
(2006)
IEEE ISSSE
, pp. 87-96
-
-
Hammer, C.1
Krinke, J.2
Snelting, G.3
-
24
-
-
0036037318
-
Information flow inference for ML
-
F. Pottier and V. Simonet, "Information flow inference for ML," in ACM TOPLAS, vol.37. 2002, pp. 319-330.
-
(2002)
ACM TOPLAS
, vol.37
, pp. 319-330
-
-
Pottier, F.1
Simonet, V.2
-
26
-
-
51749111025
-
Challenges for information-flow security
-
S. Zdancewic, "Challenges for information-flow security," PLID, 2004.
-
(2004)
PLID
-
-
Zdancewic, S.1
-
27
-
-
0030672129
-
A general theory of security properties
-
A. Zakinthinos and E. S. Lee, "A general theory of security properties," in IEEE SSP, 1997, pp. 94-102.
-
(1997)
IEEE SSP
, pp. 94-102
-
-
Zakinthinos, A.1
Lee, E.S.2
-
28
-
-
0033701251
-
Possibilistic definitions of security - An assembly kit
-
H. Mantel, "Possibilistic Definitions of Security - An Assembly Kit," in IEEE CSFW. 2000, pp. 185-199.
-
(2000)
IEEE CSFW
, pp. 185-199
-
-
Mantel, H.1
|