-
1
-
-
57049111067
-
Termination-insensitive noninterference leaks more than just a bit
-
Springer-Verlag, Oct., Volume 5283 of LNCS
-
A. Askarov and S. Hunt and A. Sabelfeld and D. Sands. Termination-insensitive noninterference leaks more than just a bit. In Proc. European Symp. on Research in Computer Security, volume 5283 of LNCS, pages 333-348. Springer-Verlag, Oct. 2008.
-
(2008)
Proc. European Symp. on Research in Computer Security
, pp. 333-348
-
-
Askarov, A.1
Hunt, S.2
Sabelfeld, A.3
Sands, D.4
-
2
-
-
84976840591
-
An axiomatic approach to information flow in programs
-
Jan
-
G. R. Andrews and R. P. Reitman. An axiomatic approach to information flow in programs. ACM TOPLAS, 2(1):56-75, Jan. 1980.
-
(1980)
ACM TOPLAS
, vol.2
, Issue.1
, pp. 56-75
-
-
Andrews, G.R.1
Reitman, R.P.2
-
3
-
-
33646080360
-
Security-typed languages for implementation of cryptographic protocols: A case study
-
Springer-Verlag, Sept., Volume 3679 of LNCS
-
A. Askarov and A. Sabelfeld. Security-typed languages for implementation of cryptographic protocols: A case study. In Proc. European Symp. on Research in Computer Security, volume 3679 of LNCS, pages 197-221. Springer-Verlag, Sept. 2005.
-
(2005)
Proc. European Symp. on Research in Computer Security
, pp. 197-221
-
-
Askarov, A.1
Sabelfeld, A.2
-
11
-
-
19544375598
-
Enforcing security and safety models with an information flow analysis tool
-
R. Chapman and A. Hilton. Enforcing security and safety models with an information flow analysis tool. ACM SIGAda Ada Letters, 24(4):39-46, 2004.
-
(2004)
ACM SIGAda Ada Letters
, vol.24
, Issue.4
, pp. 39-46
-
-
Chapman, R.1
Hilton, A.2
-
12
-
-
70450092979
-
Secure web applications via automatic partitioning
-
Oct.
-
S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, and X. Zheng. Secure web applications via automatic partitioning. In Proc. ACM Symp. on Operating System Principles, pages 31-44, Oct. 2007.
-
(2007)
Proc. ACM Symp. on Operating System Principles
, pp. 31-44
-
-
Chong, S.1
Liu, J.2
Myers, A.C.3
Qi, X.4
Vikram, K.5
Zheng, L.6
Zheng, X.7
-
13
-
-
84877700103
-
Sif: Enforcing confidentiality and integrity in web applications
-
Aug.
-
S. Chong, K. Vikram, and A. C. Myers. Sif: Enforcing confidentiality and integrity in web applications. In Proc. USENIX Security Symposium, pages 1-16, Aug. 2007.
-
(2007)
Proc. USENIX Security Symposium
, pp. 1-16
-
-
Chong, S.1
Vikram, K.2
Myers, A.C.3
-
16
-
-
0001760770
-
Information transmission in sequential programs
-
R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Academic Press
-
E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
18
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504- 513, July 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
20
-
-
0016382977
-
Memoryless subsystems
-
May
-
J. S. Fenton. Memoryless subsystems. Computing J., 17(2):143-147, May 1974.
-
(1974)
Computing J.
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
22
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
K. W. Hamlen, G. Morrisett, and F. B. Schneider. Computability classes for enforcement mechanisms. ACM TOPLAS, 28(1):175-205, 2006.
-
(2006)
ACM TOPLAS
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.W.1
Morrisett, G.2
Schneider, F.B.3
-
24
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
May
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing web application code by static analysis and runtime protection. In Proc. International Conference on World Wide Web, pages 40-52, May 2004.
-
(2004)
Proc. International Conference on World Wide Web
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
26
-
-
0015672289
-
A note on the confinement problem
-
B. W. Lampson. A note on the confinement problem. Commun. ACM, 16(10), 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.10
-
-
Lampson, B.W.1
-
27
-
-
35048820041
-
Automaton-based confidentiality monitoring of concurrent programs
-
July
-
G. Le Guernic. Automaton-based confidentiality monitoring of concurrent programs. In Proc. IEEE Computer Security Foundations Symposium, pages 218-232, July 2007.
-
(2007)
Proc. IEEE Computer Security Foundations Symposium
, pp. 218-232
-
-
Le Guernic, G.1
-
28
-
-
49949102660
-
Automata-based confidentiality monitoring
-
Springer-Verlag, Volume 4435 of LNCS
-
G. Le Guernic, A. Banerjee, T. Jensen, and D. Schmidt. Automata-based confidentiality monitoring. In Proc. Asian Computing Science Conference (ASIAN'06), volume 4435 of LNCS. Springer-Verlag, 2006.
-
(2006)
Proc. Asian Computing Science Conference (ASIAN'06)
-
-
Le Guernic, G.1
Banerjee, A.2
Jensen, T.3
Schmidt, D.4
-
32
-
-
0025211594
-
The specification and modeling of computer security
-
Jan.
-
J. McLean. The specification and modeling of computer security. Computer, 23(1):9-16, Jan. 1990.
-
(1990)
Computer
, vol.23
, Issue.1
, pp. 9-16
-
-
McLean, J.1
-
33
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
May
-
J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proc. IEEE Symp. on Security and Privacy, pages 79-93, May 1994.
-
(1994)
Proc. IEEE Symp. on Security and Privacy
, pp. 79-93
-
-
McLean, J.1
-
34
-
-
0012781083
-
Information flow control in a distributed object-oriented system with statically-bound object variables
-
M. Mizuno and A. Oldehoeft. Information flow control in a distributed object-oriented system with statically-bound object variables. In Proc. National Computer Security Conference, pages 56-67, 1987.
-
(1987)
Proc. National Computer Security Conference
, pp. 56-67
-
-
Mizuno, M.1
Oldehoeft, A.2
-
35
-
-
12844283698
-
Jif: Java information flow
-
Located at, July
-
A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif July 2001-2008.
-
(2001)
Software Release
-
-
Myers, A.C.1
Zheng, L.2
Zdancewic, S.3
Chong, S.4
Nystrom, N.5
-
36
-
-
70149084051
-
-
PhD thesis, Department of Computer Science and Engineering, Chalmers University of Technology, SE-412 96 Göteborg, Sweden, September
-
U. Norell. Towards a practical programming language based on dependent type theory. PhD thesis, Department of Computer Science and Engineering, Chalmers University of Technology, SE-412 96 Göteborg, Sweden, September 2007.
-
(2007)
Towards a Practical Programming Language Based on Dependent Type Theory
-
-
Norell, U.1
-
37
-
-
1442284555
-
Can you trust your data?
-
Springer-Verlag, May, Volume 915 of LNCS
-
P. Ørbæk. Can you trust your data? In Proc. TAPSOFT/FASE'95, volume 915 of LNCS, pages 575-590. Springer-Verlag, May 1995.
-
(1995)
Proc. TAPSOFT/FASE'95
, pp. 575-590
-
-
Ørbæk, P.1
-
46
-
-
33646091639
-
-
Software release. Located at, July
-
V. Simonet. The Flow Caml system. Software release. Located at http://cristal.inria.fr/-simonet/soft/flowcaml July 2003.
-
(2003)
The Flow Caml System
-
-
Simonet, V.1
-
47
-
-
33646037706
-
Secure information flow as a safety problem
-
Springer-Verlag, Sept., Volume 3672 of LNCS
-
T. Terauchi and A. Aiken. Secure information flow as a safety problem. In Proc. Symp. on Static Analysis, volume 3672 of LNCS, pages 352-367. Springer-Verlag, Sept. 2005.
-
(2005)
Proc. Symp. on Static Analysis
, pp. 352-367
-
-
Terauchi, T.1
Aiken, A.2
-
48
-
-
85008603199
-
Provably correct runtime enforcement of non-interference properties
-
Springer-Verlag, Dec.
-
V. N. Venkatakrishnan, W. Xu, D. C. DuVarney, and R. Sekar. Provably correct runtime enforcement of non-interference properties. In Proc. International Conference on Information and Communications Security, pages 332-351. Springer-Verlag, Dec. 2006.
-
(2006)
Proc. International Conference on Information and Communications Security
, pp. 332-351
-
-
Venkatakrishnan, V.N.1
Xu, W.2
Duvarney, D.C.3
Sekar, R.4
-
49
-
-
84887309913
-
Cross-site scripting prevention with dynamic data tainting and static analysis
-
Feb.
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-site scripting prevention with dynamic data tainting and static analysis. In Proc. Network and Distributed System Security Symposium, Feb. 2007.
-
(2007)
Proc. Network and Distributed System Security Symposium
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
50
-
-
84957709924
-
Safety versus secrecy
-
Springer-Verlag, Sept., Volume 1694 of LNCS
-
D. Volpano. Safety versus secrecy. In Proc. Symp. on Static Analysis, volume 1694 of LNCS, pages 303-311. Springer-Verlag, Sept. 1999.
-
(1999)
Proc. Symp. on Static Analysis
, pp. 303-311
-
-
Volpano, D.1
-
52
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3):167-187, 1996.
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine., C.3
|