-
1
-
-
67749102277
-
Parameterised notions of computation
-
R. Atkey. Parameterised notions of computation. Journal of Functional Programming, 19(3-4):335-376, 2009.
-
(2009)
Journal of Functional Programming
, vol.19
, Issue.3-4
, pp. 335-376
-
-
Atkey, R.1
-
2
-
-
70450239729
-
Efficient purely-dynamic information flow analysis
-
ACM
-
T. Austin and C. Flanagan. Efficient purely-dynamic information flow analysis. In PLAS Workshop, pages 113-124. ACM, 2009.
-
(2009)
PLAS Workshop
, pp. 113-124
-
-
Austin, T.1
Flanagan, C.2
-
3
-
-
17044427985
-
A monadic analysis of information flow security with mutable state
-
K. Crary, A. Kliger, and F. Pfenning. A monadic analysis of information flow security with mutable state. Journal of functional programming, 15(02):249-291, 2005.
-
(2005)
Journal of Functional Programming
, vol.15
, Issue.2
, pp. 249-291
-
-
Crary, K.1
Kliger, A.2
Pfenning, F.3
-
7
-
-
0033751744
-
Generalising monads to arrows
-
J. Hughes. Generalising monads to arrows. Science of computer programming, 37(1-3):67-111, 2000.
-
(2000)
Science of Computer Programming
, vol.37
, Issue.1-3
, pp. 67-111
-
-
Hughes, J.1
-
9
-
-
79952150551
-
Parameterized monads in haskell
-
URL
-
E. Kmett. Parameterized monads in haskell. The Comonad. Reader, 2007. URL http://comonad.com/reader/2007/parameterized-monads-in-haskell/.
-
(2007)
The Comonad. Reader
-
-
Kmett, E.1
-
10
-
-
85085672120
-
Lazy functional state threads
-
ACM
-
J. Launchbury, P. Jones, and L. Simon. Lazy functional state threads. In PLDI, page 35. ACM, 1994.
-
(1994)
PLDI
, vol.35
-
-
Launchbury, J.1
Jones, P.2
Simon, L.3
-
12
-
-
49949102660
-
Automata-based confidentiality monitoring
-
G. Le Guernic, A. Banerjee, T. Jensen, and D. Schmidt. Automata-based confidentiality monitoring. In ASIAN, pages 75 - 89, 2006.
-
(2006)
ASIAN
, pp. 75-89
-
-
Le Guernic, G.1
Banerjee, A.2
Jensen, T.3
Schmidt, D.4
-
14
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
DOI 10.1007/s10207-004-0046-8
-
J. Ligatti, L. Bauer, and D. Walker. Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security, 4(1):2-16, 2005. (Pubitemid 40347198)
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
15
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
ACM
-
A. Myers. JFlow: Practical mostly-static information flow control. In POPL, pages 228-241. ACM, 1999.
-
(1999)
POPL
, pp. 228-241
-
-
Myers, A.1
-
16
-
-
0348017041
-
Information flow inference for ML
-
F. Pottier and V. Simonet. Information flow inference for ML. TOPLAS, 25(1):117-158, 2003.
-
(2003)
TOPLAS
, vol.25
, Issue.1
, pp. 117-158
-
-
Pottier, F.1
Simonet, V.2
-
17
-
-
67650789536
-
Haskell session types with (almost) no class
-
R. Pucella and J. Tov. Haskell session types with (almost) no class. ACM SIGPLAN Notices, 44(2):25-36, 2009.
-
(2009)
ACM Sigplan Notices
, vol.44
, Issue.2
, pp. 25-36
-
-
Pucella, R.1
Tov, J.2
-
19
-
-
63149101516
-
A library for light-weight information-flow security in haskell
-
ACM
-
A. Russo, K. Claessen, and J. Hughes. A library for light-weight information-flow security in haskell. In Haskell Symposium, pages 13-24. ACM, 2008.
-
(2008)
Haskell Symposium
, pp. 13-24
-
-
Russo, A.1
Claessen, K.2
Hughes, J.3
-
21
-
-
84860313876
-
From dynamic to static and back: Riding the roller coaster of information-flow control research
-
A. Sabelfeld and A. Russo. From dynamic to static and back: Riding the roller coaster of information-flow control research. In Perspectives of System Informatics, 2009.
-
(2009)
Perspectives of System Informatics
-
-
Sabelfeld, A.1
Russo, A.2
-
22
-
-
35048824886
-
A library for secure multithreaded information flow in haskell
-
T.-C. Tsai, A. Russo, and J. Hughes. A library for secure multithreaded information flow in Haskell. In CSF, pages 187-202, 2007.
-
(2007)
CSF
, pp. 187-202
-
-
Tsai, T.-C.1
Russo, A.2
Hughes, J.3
-
23
-
-
0030673701
-
Eliminating covert flows with minimum typings
-
D. Volpano and G. Smith. Eliminating covert flows with minimum typings. In CSFW, pages 156-168, 1997.
-
(1997)
CSFW
, pp. 156-168
-
-
Volpano, D.1
Smith, G.2
-
24
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, C. Irvine, and G. Smith. A sound type system for secure flow analysis. Journal of computer security, 4(2/3):167-188, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-188
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
|