-
2
-
-
70449625216
-
Automatic Discovery and Quantification of Information Leaks
-
to appear
-
Backes, M., Köpf, B., Rybalchenko, A.: Automatic Discovery and Quantification of Information Leaks. In: Proc. 30th IEEE Symposium on Security and Privacy, S& P 2009 (2009) (to appear)
-
Proc. 30th IEEE Symposium on Security and Privacy, S& P 2009 (2009)
-
-
Backes, M.1
Köpf, B.2
Rybalchenko, A.3
-
4
-
-
0031365466
-
Using CSP look-back techniques to solve real-world SAT instances
-
AAAI Press/The MIT Press
-
Bayardo, R., Schrag, R.: Using CSP look-back techniques to solve real-world SAT instances. In: Proc. of AAAI 1997, pp. 203-208. AAAI Press/The MIT Press (1997)
-
(1997)
Proc. of AAAI 1997
, pp. 203-208
-
-
Bayardo, R.1
Schrag, R.2
-
5
-
-
34249899908
-
A static analysis for quantifying information flow in a simple imperative language
-
Clark, D., Hunt, S., Malacaria, P.: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security 15(3) (2007)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.3
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
6
-
-
20844445346
-
Quantitative information flow, relations and polymorphic types
-
DOI 10.1093/logcom/exi009, Lambda Calculus, Type Theory and Natural Language
-
Clark, D., Hunt, S., Malacaria, P.: Quantitative information flow, relations and polymorphic types. Journal of Logic and Computation, Special Issue on Lambda-calculus, type theory and natural language 18(2), 181-199 (2005) (Pubitemid 40860589)
-
(2005)
Journal of Logic and Computation
, vol.15
, Issue.2
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
7
-
-
35048861896
-
A Tool for Checking ANSI-C Programs
-
Jensen, K., Podelski, A. (eds.) TACAS 2004. Springer, Heidelberg
-
Clarke, E., Kroening, D., Lerda, F.: A Tool for Checking ANSI-C Programs. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol. 2988, pp. 168-176. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2988
, pp. 168-176
-
-
Clarke, E.1
Kroening, D.2
Lerda, F.3
-
9
-
-
0018998235
-
A fast procedure for finding a tracker in a statistical database
-
Denning, D.E., Schlšrer, J.: A fast procedure for finding a tracker in a statistical database. ACM Transactions on Database Systems 5(1), 88-102 (1980)
-
(1980)
ACM Transactions on Database Systems
, vol.5
, Issue.1
, pp. 88-102
-
-
Denning, D.E.1
Schlšrer, J.2
-
10
-
-
0018444418
-
SECURE DATABASES: PROTECTION AGAINST USER INFLUENCE
-
DOI 10.1145/320064.320068
-
Dobkin, D., Jones, A.K., Lipton, R.J.: Secure databases: Protection against user influence. ACM Transactions on Database Systems 4, 97-106 (1979) (Pubitemid 9437765)
-
(1979)
ACM Transactions on Database Systems
, vol.4
, Issue.1
, pp. 97-106
-
-
Dobkin, D.1
Jones Anita, K.2
Lipton Richard, J.3
-
11
-
-
4444226915
-
-
Carnegie Mellon University, Technical Report CMU-CS-03-151
-
Chauhan, P., Clarke, E.M., Kroening, D.: Using SAT based Image Computation for Reachability. Carnegie Mellon University, Technical Report CMU-CS-03-151 (2003)
-
(2003)
Using SAT Based Image Computation for Reachability
-
-
Chauhan, P.1
Clarke, E.M.2
Kroening, D.3
-
15
-
-
77953245493
-
Risk Assessment of Security Threats for Looping Constructs
-
To appear in the
-
Malacaria, P.: Risk Assessment of Security Threats for Looping Constructs. To appear in the Journal Of Computer Security (2009)
-
(2009)
Journal of Computer Security
-
-
Malacaria, P.1
-
16
-
-
84972500235
-
Entropy and Semivaluations on Semilattices
-
Nakamura, Y.: Entropy and Semivaluations on Semilattices. Kodai Math. Sem. Rep. 22, 443-468 (1970)
-
(1970)
Kodai Math. Sem. Rep.
, vol.22
, pp. 443-468
-
-
Nakamura, Y.1
-
18
-
-
33646037706
-
Secure information flow as a safety problem
-
Hankin, C., Siveroni, I. (eds.) SAS 2005. Springer, Heidelberg
-
Terauchi, T., Aiken, A.: Secure information flow as a safety problem. In: Hankin, C., Siveroni, I. (eds.) SAS 2005. LNCS, vol. 3672, pp. 352-367. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3672
, pp. 352-367
-
-
Terauchi, T.1
Aiken, A.2
|