-
3
-
-
0020762394
-
Security mechanisms in highlevel network protocols
-
Jun.
-
V. L. Voydock and S. T. Kent, "Security mechanisms in highlevel network protocols, " Computing Surveys, vol. 15, no. 2, Jun. 1983.
-
(1983)
Computing Surveys
, vol.15
, Issue.2
-
-
Voydock, V.L.1
Kent, S.T.2
-
4
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
Apr.
-
D. D. Clark and D. R. Wilson, "A comparison of commercial and military computer security policies, " in Proc. IEEE Symposium on Security and Privacy, Apr. 1987, pp. 184-194.
-
(1987)
Proc. IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
6
-
-
77957599846
-
Information technology security evaluation criteria: Provisional harmonised criteria
-
Commission of the European Communities (ECSC, EEC, EAEC), ", " Jun., 314, Version 1.2
-
Commission of the European Communities (ECSC, EEC, EAEC), "Information Technology Security Evaluation Criteria: Provisional harmonised criteria, " Jun. 1991, document COM(90) 314, Version 1.2.
-
(1991)
Document COM
, Issue.90
-
-
-
9
-
-
0004207406
-
-
2nd ed. Sebastopol, California: O'Reilly
-
L. Wall, T. Christiansen, and R. L. Schwartz, Programming Perl, 2nd ed. Sebastopol, California: O'Reilly, 1996.
-
(1996)
Programming Perl
-
-
Wall, L.1
Christiansen, T.2
Schwartz, R.L.3
-
10
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Oct.
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devedas, "Secure program execution via dynamic information flow tracking, " in Proc. ACM Conference on Architectural Support for Programming Languages and Systems, Oct. 2004, pp. 85-96.
-
(2004)
Proc. ACM Conference on Architectural Support for Programming Languages and Systems
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devedas, S.4
-
11
-
-
84923564816
-
Finding security vulnerabilities in Java applications with static analysis
-
Aug.
-
V. B. Livshits and M. S. Lam, "Finding security vulnerabilities in Java applications with static analysis, " in Proc. USENIX Security Symposium, Aug. 2005, pp. 271-286.
-
(2005)
Proc. USENIX Security Symposium
, pp. 271-286
-
-
Livshits, V.B.1
Lam, M.S.2
-
12
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis and signature generation of exploits on commodity software
-
Feb., available from
-
J. Newsome and D. Song, "Dynamic taint analysis for automatic detection, analysis and signature generation of exploits on commodity software, " in Proc. Symposium on Network and Distributed System Security, Feb. 2005, available from http://www.isoc.org/isoc/conferences/ndss/05/proceedings/papers/ taintcheck.pdf.
-
(2005)
Proc. Symposium on Network and Distributed System Security
-
-
Newsome, J.1
Song, D.2
-
13
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
Aug.
-
W. Xu, S. Bhatkar, and R. Sekar, "Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks, " in Proc. USENIX Security Symposium, Aug. 2006, pp. 121-136.
-
(2006)
Proc. USENIX Security Symposium
, pp. 121-136
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
-
14
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Apr.
-
K. Biba, "Integrity considerations for secure computer systems, " MITRE Corporation, Tech. Rep. MTR-3153, Apr. 1977.
-
(1977)
MITRE Corporation, Tech. Rep. MTR-3153
-
-
Biba, K.1
-
15
-
-
20844445346
-
Quantitative information flow, relations and polymorphic types
-
D. Clark, S. Hunt, and P. Malacaria, "Quantitative information flow, relations and polymorphic types, " Journal of Logic and Computation, vol. 18, no. 2, pp. 181-199, 2005.
-
(2005)
Journal of Logic and Computation
, vol.18
, Issue.2
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
16
-
-
70449455866
-
Quantifying information flow with beliefs
-
M. R. Clarkson, A. C. Myers, and F. B. Schneider, "Quantifying information flow with beliefs, " Journal of Computer Security, vol. 17, no. 5, pp. 655-701, 2009.
-
(2009)
Journal of Computer Security
, vol.17
, Issue.5
, pp. 655-701
-
-
Clarkson, M.R.1
Myers, A.C.2
Schneider, F.B.3
-
17
-
-
70450252184
-
Measuring channel capacity to distinguish undue influence
-
Jun., available from
-
J. Newsome, S. McCamant, and D. Song, "Measuring channel capacity to distinguish undue influence, " in Proc. ACM Workshop on Programming Languages and Analysis for Security, Jun. 2009, available from http://doi.acm.org/10.1145/1554339.1554349.
-
(2009)
Proc. ACM Workshop on Programming Languages and Analysis for Security
-
-
Newsome, J.1
Mccamant, S.2
Song, D.3
-
18
-
-
84856043672
-
A mathematical theory of communication
-
623-656
-
C. E. Shannon, "A mathematical theory of communication, " Bell System Technical Journal, vol. 27, pp. 379-423, 623- 656, 1948.
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
22
-
-
34249899908
-
A static analysis for quantifying information flow in a simple imperative language
-
D. Clark, S. Hunt, and P. Malacaria, "A static analysis for quantifying information flow in a simple imperative language, " Journal of Computer Security, vol. 15, no. 3, pp. 321-371, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.3
, pp. 321-371
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
23
-
-
0019572941
-
Semantics of probabilistic programs
-
D. Kozen, "Semantics of probabilistic programs, " Journal of Computer and System Sciences, vol. 22, pp. 328-350, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 328-350
-
-
Kozen, D.1
-
24
-
-
84881225236
-
Enforceable security policies
-
F. B. Schneider, "Enforceable security policies, " ACM Transactions on Information and System Security, vol. 3, no. 1, pp. 30-50, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
26
-
-
84906487819
-
Enhancing server availability and security through failure-oblivious computing
-
Dec.
-
M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and W. S. Beebee, Jr., "Enhancing server availability and security through failure-oblivious computing, " in Proc. USENIX Symposium on Operating System Design and Implementation, Dec. 2004, pp. 303-316.
-
(2004)
Proc. USENIX Symposium on Operating System Design and Implementation
, pp. 303-316
-
-
Rinard, M.1
Cadar, C.2
Dumitran, D.3
Roy, D.M.4
Leu, T.5
Beebee, Jr.W.S.6
-
27
-
-
28144442041
-
Belief in information flow
-
Jun.
-
M. R. Clarkson, A. C. Myers, and F. B. Schneider, "Belief in information flow, " in Proc. IEEE Computer Security Foundations Workshop, Jun. 2005, pp. 31-45.
-
(2005)
Proc. IEEE Computer Security Foundations Workshop
, pp. 31-45
-
-
Clarkson, M.R.1
Myers, A.C.2
Schneider, F.B.3
-
28
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
L. Sweeney, "Achieving k-anonymity privacy protection using generalization and suppression, " International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no. 5, pp. 571-588, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
29
-
-
34248181923
-
E-Diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, " E-diversity: Privacy beyond k-anonymity, " ACM Transactions on Knowledge Discovery from Data, vol. 1, no. 1, 2007.
-
(2007)
ACM Transactions on Knowledge Discovery from Data
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
31
-
-
0033105319
-
Using Boolean reasoning to anonymize databases
-
A. Øhrn and L. Ohno-Machado, "Using Boolean reasoning to anonymize databases, " Artificial Intelligence in Medicine, vol. 15, no. 3, pp. 235-254, 1999.
-
(1999)
Artificial Intelligence in Medicine
, vol.15
, Issue.3
, pp. 235-254
-
-
Øhrn, A.1
Ohno-Machado, L.2
-
33
-
-
0026157130
-
Toward a mathematical foundation for information flow security
-
May
-
J. W. Gray, III, "Toward a mathematical foundation for information flow security, " in Proc. IEEE Symposium on Security and Privacy, May 1991, pp. 21-35.
-
(1991)
Proc. IEEE Symposium on Security and Privacy
, pp. 21-35
-
-
Gray III, J.W.1
-
35
-
-
11344288540
-
Quantified interference for a while language
-
Jan.
-
D. Clark, S. Hunt, and P. Malacaria, "Quantified interference for a while language, " Electronic Notes in Theoretical Computer Science, vol. 112, pp. 149-166, Jan. 2005.
-
(2005)
Electronic Notes in Theoretical Computer Science
, vol.112
, pp. 149-166
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
37
-
-
70449625216
-
Automated discovery and quantification of information leaks
-
May
-
M. Backes, B. Köpf, and A. Rybalchenko, "Automated discovery and quantification of information leaks, " in Proc. IEEE Symposium on Security and Privacy, May 2009, pp. 141-153.
-
(2009)
Proc. IEEE Symposium on Security and Privacy
, pp. 141-153
-
-
Backes, M.1
Köpf, B.2
Rybalchenko, A.3
-
39
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
Mar.
-
D. E. Bell and L. J. LaPadula, "Secure computer systems: Mathematical foundations, " MITRE Corporation, Tech. Rep. 2547, Volume1, Mar. 1973.
-
(2547)
MITRE Corporation, Tech. Rep.
, vol.1
-
-
Bell, D.E.1
Lapadula, L.J.2
-
41
-
-
0348017041
-
Information flow inference for ML
-
Jan
-
F. Pottier and V. Simonet, "Information flow inference for ML, " ACM Transactions on Programming Languages and Systems, vol. 25, no. 1, pp. 117-158, Jan. 2003.
-
(2003)
ACM Transactions on Programming Languages and Systems
, vol.25
, Issue.1
, pp. 117-158
-
-
Pottier, F.1
Simonet, V.2
-
42
-
-
0036036793
-
Untrusted hosts and confidentiality: Secure program partitioning
-
Oct.
-
S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers, "Untrusted hosts and confidentiality: Secure program partitioning, " in Proc. ACM Symposium on Operating Systems Principles, Oct. 2001, pp. 1-14.
-
(2001)
Proc. ACM Symposium on Operating Systems Principles
, pp. 1-14
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.C.4
-
44
-
-
84877700103
-
SIF: Enforcing confidentiality and integrity in web applications
-
Aug.
-
S. Chong, K. Vikram, and A. C. Myers, "SIF: Enforcing confidentiality and integrity in web applications, " in Proc. USENIX Security Symposium, Aug. 2007, pp. 1-16.
-
(2007)
Proc. USENIX Security Symposium
, pp. 1-16
-
-
Chong, S.1
Vikram, K.2
Myers, A.C.3
-
45
-
-
70450092979
-
Secure web applications via automatic partitioning
-
Oct.
-
S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, and X. Zheng, "Secure web applications via automatic partitioning, " in Proc. ACM Symposium on Operating Systems Principles, Oct. 2007, pp. 31-44.
-
(2007)
Proc. ACM Symposium on Operating Systems Principles
, pp. 31-44
-
-
Chong, S.1
Liu, J.2
Myers, A.C.3
Qi, X.4
Vikram, K.5
Zheng, L.6
Zheng, X.7
-
46
-
-
72549083642
-
Fabric: A platform for secure distributed computation and storage
-
Oct.
-
J. Liu, M. D. George, K. Vikram, X. Qi, L. Waye, and A. C. Myers, "Fabric: A platform for secure distributed computation and storage, " in Proc. ACM Symposium on Operating Systems Principles, Oct. 2009, pp. 321-334.
-
(2009)
Proc. ACM Symposium on Operating Systems Principles
, pp. 321-334
-
-
Liu, J.1
George, M.D.2
Vikram, K.3
Qi, X.4
Waye, L.5
Myers, A.C.6
-
47
-
-
57749192483
-
Information flow control for standard OS abstractions
-
Oct.
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris, "Information flow control for standard OS abstractions, " in Proc. ACM Symposium on Operating Systems Principles, Oct. 2007, pp. 321-334.
-
(2007)
Proc. ACM Symposium on Operating Systems Principles
, pp. 321-334
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
48
-
-
85015649873
-
Airavat: Security and privacy for MapReduce
-
Apr.
-
I. Roy, S. T. V. Setty, A. Kilzer, V. Shmatikov, and E. Witchel, "Airavat: Security and privacy for MapReduce, " in Proc. USENIX Symposium on Networked Systems Design and Implementation, Apr. 2010, pp. 297-312.
-
(2010)
Proc. USENIX Symposium on Networked Systems Design and Implementation
, pp. 297-312
-
-
Roy, I.1
Setty, S.T.V.2
Kilzer, A.3
Shmatikov, V.4
Witchel, E.5
-
51
-
-
37049224492
-
The need of psychological training
-
Mar., available from
-
E. W. Scripture, "The need of psychological training, " Science, vol. 19, no. 474, pp. 127-128, Mar. 1892, available from http://www.jstor.org/stable/1766918.
-
(1892)
Science
, vol.19
, Issue.474
, pp. 127-128
-
-
Scripture, E.W.1
|