-
1
-
-
0037251378
-
Language-based information-flow security
-
Jan.
-
A. Sabelfeld and A. Myers, "Language-based information-flow security, " IEEE Journal on Selected Areas in Communications, vol. 21, no. 1, pp. 5-19, Jan. 2003.
-
(2003)
IEEE Journal on Selected Areas in Communications
, vol.21
, Issue.1
, pp. 5-19
-
-
Sabelfeld, A.1
Myers, A.2
-
5
-
-
11344288540
-
Quantified interference for a while language
-
Jan.
-
D. Clark, S. Hunt, and P. Malacaria, "Quantified interference for a while language, " Electronic Notes in Theoretical Computer Science, vol. 112, pp. 149-166, Jan. 2005.
-
(2005)
Electronic Notes in Theoretical Computer Science
, vol.112
, pp. 149-166
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
7
-
-
38049082649
-
What, indeed, is intransitive noninterference?
-
ser. Lecture Notes in Computer Science, Springer, Sep
-
R. van der Meyden, "What, indeed, is intransitive noninterference?" in Proceedings of the 12th European Symposium On Research In Computer Security, ser. Lecture Notes in Computer Science, vol. 4734. Springer, Sep. 2007, pp. 235-250.
-
(2007)
Proceedings of the 12th European Symposium on Research in Computer Security
, vol.4734
, pp. 235-250
-
-
Van Der Meyden, R.1
-
10
-
-
0009095248
-
Algorithmic knowledge
-
Mar.
-
J. Y. Halpern, Y. Moses, and M. Y. Vardi, "Algorithmic knowledge, " in Proceedings of the 5th Conference on Theoretical Aspects of Reasoning about Knowledge, Mar. 1994, pp. 255-266.
-
(1994)
Proceedings of the 5th Conference on Theoretical Aspects of Reasoning about Knowledge
, pp. 255-266
-
-
Halpern, J.Y.1
Moses, Y.2
Vardi, M.Y.3
-
11
-
-
35048828759
-
A model for delimited release
-
ser. Lecture Notes in Computer Science, Springer-Verlag
-
A. Sabelfeld and A. C. Myers, "A model for delimited release, " in Proceedings of the 2003 International Symposium on Software Security, ser. Lecture Notes in Computer Science, no. 3233. Springer-Verlag, 2004, pp. 174-191.
-
(2004)
Proceedings of the 2003 International Symposium on Software Security
, Issue.3233
, pp. 174-191
-
-
Sabelfeld, A.1
Myers, A.C.2
-
13
-
-
0003730235
-
-
Cambridge, MA: MIT Press
-
R. Fagin, J. Y. Halpern, Y. Moses, and M. Y. Vardi, Reasoning about Knowledge. Cambridge, MA: MIT Press, 1995.
-
(1995)
Reasoning about Knowledge
-
-
Fagin, R.1
Halpern, J.Y.2
Moses, Y.3
Vardi, M.Y.4
-
15
-
-
33645745601
-
Deductive algorithmic knowledge
-
R. Pucella, "Deductive algorithmic knowledge, " Journal of Logic and Computation, vol. 16, no. 2, pp. 287- 309, 2006.
-
(2006)
Journal of Logic and Computation
, vol.16
, Issue.2
, pp. 287-309
-
-
Pucella, R.1
-
17
-
-
0031682833
-
Complete, safe information flow with decentralized labels
-
IEEE Computer Society, May
-
A. C. Myers and B. Liskov, "Complete, safe information flow with decentralized labels, " in Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, May 1998, pp. 186-197.
-
(1998)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 186-197
-
-
Myers, A.C.1
Liskov, B.2
-
19
-
-
0022420723
-
Defining liveness
-
Oct.
-
B. Alpern and F. B. Schneider, "Defining liveness, " Information Processing Letters, vol. 21, no. 4, pp. 181- 185, Oct. 1985.
-
(1985)
Information Processing Letters
, vol.21
, Issue.4
, pp. 181-185
-
-
Alpern, B.1
Schneider, F.B.2
-
21
-
-
0017517624
-
Certification of programs for secure information flow
-
Jul.
-
D. E. Denning and P. J. Denning, "Certification of programs for secure information flow, " Communications of the ACM, vol. 20, no. 7, pp. 504-513, Jul. 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
25
-
-
34548715313
-
Gradual release: Unifying declassification, encryption and key release policies
-
IEEE Computer Society
-
-, "Gradual release: Unifying declassification, encryption and key release policies, " in Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, 2007, pp. 207-221.
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 207-221
-
-
-
27
-
-
84881225236
-
Enforceable security policies
-
F. B. Schneider, "Enforceable security policies, " ACM Transactions on Information and System Security, vol. 3, no. 1, pp. 30-50, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
30
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
Oct.
-
A. C. Myers and B. Liskov, "Protecting privacy using the decentralized label model, " ACM Transactions on Software Engineering and Methodology, vol. 9, no. 4, pp. 410-442, Oct. 2000.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
|