메뉴 건너뛰기




Volumn , Issue , 2010, Pages 431-444

Paralocks: Role-based information flow control and beyond

Author keywords

Information flow; Language based security; Security policies

Indexed keywords

DISCRETIONARY ACCESS CONTROL; EXPRESSIVE POWER; INFORMATION FLOW CONTROL; INFORMATION FLOW POLICIES; INFORMATION FLOW SECURITY; INFORMATION FLOWS; LANGUAGE-BASED SECURITY; POLICY LANGUAGE; POLICY SPECIFICATION; PROGRAMMING LANGUAGE; ROLE-BASED; ROLE-BASED ACCESS CONTROL; RUNTIMES; SECURITY POLICY; STATIC TYPE SYSTEMS;

EID: 77950913806     PISSN: 07308566     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1706299.1706349     Document Type: Conference Paper
Times cited : (39)

References (35)
  • 2
    • 34548715313 scopus 로고    scopus 로고
    • Gradual release: Unifying declassification, encryption and key release policies
    • [AS07] May
    • [AS07] A. Askarov and A. Sabelfeld. Gradual release: Unifying declassification, encryption and key release policies. In Proc. IEEE Symp. on Security and Privacy, pages 207-221, May 2007.
    • (2007) Proc. IEEE Symp. on Security and Privacy , pp. 207-221
    • Askarov, A.1    Sabelfeld, A.2
  • 5
    • 50249109550 scopus 로고    scopus 로고
    • Expressive declassification policies and modular static enforcement
    • [BNR08] IEEE Computer Society
    • [BNR08] A. Banerjee, D. Naumann, and S. Rosenberg. Expressive declassification policies and modular static enforcement. In Proc. IEEE Symp. on Security and Privacy, pages 339-353. IEEE Computer Society, 2008.
    • (2008) Proc. IEEE Symp. on Security and Privacy , pp. 339-353
    • Banerjee, A.1    Naumann, D.2    Rosenberg, S.3
  • 11
    • 84958776545 scopus 로고
    • Optimal implementation of conjunctive queries in relational databases
    • [CM77]
    • [CM77] A. K. Chandra and P. M. Merlin. Optimal implementation of conjunctive queries in relational databases. In STOC, pages 77-90, 1977.
    • (1977) STOC , pp. 77-90
    • Chandra, A.K.1    Merlin, P.M.2
  • 12
    • 0031075172 scopus 로고    scopus 로고
    • On the equivalence of recursive and nonrecursive datalog programs
    • [CV97]
    • [CV97] Surajit Chaudhuri and Moshe Y. Vardi. On the equivalence of recursive and nonrecursive datalog programs. Journal of Computer and System Sciences, 54(1):61-78, 1997.
    • (1997) Journal of Computer and System Sciences , vol.54 , Issue.1 , pp. 61-78
    • Chaudhuri, S.1    Vardi, M.Y.2
  • 13
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • [Den76] May
    • [Den76] D. E. Denning. A lattice model of secure information flow. Comm. of the ACM, 19(5):236-243, May 1976.
    • (1976) Comm. of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 14
  • 18
    • 2442507870 scopus 로고    scopus 로고
    • Abstract non-interference: Parameterizing non-interference by abstract interpretation
    • [GM04] January
    • [GM04] R. Giacobazzi and I. Mastroeni. Abstract non-interference: Parameterizing non-interference by abstract interpretation. In Proc. ACM Symp. on Principles of Programming Languages, pages 186-197, January 2004.
    • (2004) Proc. ACM Symp. on Principles of Programming Languages , pp. 186-197
    • Giacobazzi, R.1    Mastroeni, I.2
  • 20
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • [Jim01]
    • [Jim01] T. Jim. SD3: A trust management system with certified evaluation. In IEEE Symposium on Security and Privacy, pages 106-115, 2001.
    • (2001) IEEE Symposium on Security and Privacy , pp. 106-115
    • Jim, T.1
  • 24
    • 0031682833 scopus 로고    scopus 로고
    • Complete, safe information flow with decentralized labels
    • [ML98] May
    • [ML98] A. C. Myers and B. Liskov. Complete, safe information flow with decentralized labels. In Proc. IEEE Symp. on Security and Privacy, pages 186-197, May 1998.
    • (1998) Proc. IEEE Symp. on Security and Privacy , pp. 186-197
    • Myers, A.C.1    Liskov, B.2
  • 25
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • [Mye99] January
    • [Mye99] A. C. Myers. JFlow: Practical mostly-static information flow control. In Proc. ACM Symp. on Principles of Programming Languages, pages 228-241, January 1999.
    • (1999) Proc. ACM Symp. on Principles of Programming Languages , pp. 228-241
    • Myers, A.C.1
  • 27
  • 30
    • 0035276729 scopus 로고    scopus 로고
    • A per model of secure information flow in sequential programs
    • [SS01] March
    • [SS01] A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher Order and Symbolic Computation, 14(1):59-91, March 2001.
    • (2001) Higher Order and Symbolic Computation , vol.14 , Issue.1 , pp. 59-91
    • Sabelfeld, A.1    Sands, D.2
  • 32
    • 84976685263 scopus 로고
    • Equivalences among relational expressions with the union and difference operators
    • [SY80]
    • [SY80] Y. Sagiv and M. Yannakakis. Equivalences among relational expressions with the union and difference operators. Journal of the ACM, 27, 1980.
    • (1980) Journal of the ACM , vol.27
    • Sagiv, Y.1    Yannakakis, M.2
  • 33
    • 3543147869 scopus 로고    scopus 로고
    • Run-time principals in information-flow type systems
    • [TZ04]
    • [TZ04] S. Tse and S. Zdancewic. Run-time principals in information-flow type systems. In Proc. IEEE Symp. on Security and Privacy, pages 179-193, 2004.
    • (2004) Proc. IEEE Symp. on Security and Privacy , pp. 179-193
    • Tse, S.1    Zdancewic, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.