-
1
-
-
34247276117
-
Access control in a core calculus of dependency
-
ICFP 2006, Portland, Oregon, USA, September 16-21 ACM 2006
-
M. Abadi. Access control in a core calculus of dependency. In Proceedings of the 11th ACM SIGPLAN International Conference on Functional Programming, ICFP 2006, Portland, Oregon, USA, September 16-21, 2006, pp. 263-273. ACM, 2006.
-
(2006)
Proceedings of the 11th ACM SIGPLAN International Conference on Functional Programming
, pp. 263-273
-
-
Abadi, M.1
-
2
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi, P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). In Journal of Cryp-tology, 15(2):103-127, 2002.
-
(2002)
Journal of Cryp-tology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
33749846305
-
Cryptographically-masked flows
-
Seoul, Korea
-
A. Askarov, D. Hedin, A. Sabelfeld. Cryptographically-masked flows. In SAS '06, LNCS. Seoul, Korea, 2006.
-
(2006)
SAS '06, LNCS
-
-
Askarov, A.1
Hedin, D.2
Sabelfeld, A.3
-
4
-
-
57049111067
-
Termination-insensitive noninterference leaks more than just a bit
-
A. Askarov, S. Hunt, A. Sabelfeld, D. Sands. Termination-insensitive noninterference leaks more than just a bit. In ESORICS '08, pp. 333-348. 2008.
-
(2008)
ESORICS '08
, pp. 333-348
-
-
Askarov, A.1
Hunt, S.2
Sabelfeld, A.3
Sands, D.4
-
5
-
-
34548715313
-
Gradual release: Unifying declassification, encryption and key release policies
-
DOI 10.1109/SP.2007.22, 4223226, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
A. Askarov, A. Sabelfeld. Gradual release: Unifying declassification, encryption and key release policies. In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp. 207-221. IEEE Computer Society, Washington, DC, USA, 2007. (Pubitemid 47432528)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 207-221
-
-
Askarov, A.1
Sabelfeld, A.2
-
7
-
-
1442292329
-
A composable cryptographic library with nested operations
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
M. Backes, B. Pfitzmann, M. Waidner. A composable cryptographic library with nested operations. In CCS '03: Proceedings of the 10th ACM Conference on Computer and Communications security, pp. 220-230. ACM Press, Washington D.C., USA, 2003. (Pubitemid 40673804)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
8
-
-
70350323754
-
Formal certification of code-based cryptographic proofs
-
ACM, New York, NY, USA
-
G. Barthe, B. Grégoire, S. Zanella Béguelin. Formal certification of code-based cryptographic proofs. In POPL '09: Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 90-101. ACM, New York, NY, USA, 2009.
-
(2009)
POPL '09: Proceedings of the 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 90-101
-
-
Barthe, G.1
Grégoire, B.2
Zanella Béguelin, S.3
-
12
-
-
79952151567
-
-
North-Holland, Amsterdam
-
H. B. Curry, R. Feys, W. Craig. Combinatory Logic, vol. 1. North-Holland, Amsterdam, 1958.
-
(1958)
Combinatory Logic
, vol.1
-
-
Curry, H.B.1
Feys, R.2
Craig, W.3
-
15
-
-
84865659111
-
Cryptographically sound implementations for typed information-flow security
-
C. Fournet, T. Rezk. Cryptographically sound implementations for typed information-flow security. In POPL '08, pp. 323-335. 2008.
-
(2008)
POPL '08
, pp. 323-335
-
-
Fournet, C.1
Rezk, T.2
-
16
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC '09. 2009.
-
(2009)
STOC '09
-
-
Gentry, C.1
-
17
-
-
2942697713
-
Mathematical modal logic: A view of its evolution
-
DOI 10.1016/S1570-8683(03)00008-9
-
R. Goldblatt. Mathematical modal logic: a view of its evolution. In J. of Applied Logic, 1(5-6):309-392, 2003. (Pubitemid 41155185)
-
(2003)
Journal of Applied Logic
, vol.1
, Issue.5-6
, pp. 309-392
-
-
Goldblatt, R.1
-
18
-
-
0031701347
-
The SLam calculus: Programming with secrecy and integrity
-
ACM Press, New York, NY
-
N. Heintze, J. G. Riecke. The SLam calculus: programming with secrecy and integrity. In POPL '98, pp. 365-377. ACM Press, New York, NY, 1998.
-
(1998)
POPL '98
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.G.2
-
19
-
-
0002386430
-
The formulae-as-types notion of construction
-
J. P. Seldin, J. R. Hindly, eds. Academic Press, New York
-
W. A. Howard. The formulae-as-types notion of construction. In J. P. Seldin, J. R. Hindly, eds., To H. B. Curry: Essays on Combinatory Logic, Lambda-Calculus, and Formalism, pp. 479-490. Academic Press, New York, 1980.
-
(1980)
To H. B. Curry: Essays on Combinatory Logic, Lambda-calculus, and Formalism
, pp. 479-490
-
-
Howard, W.A.1
-
20
-
-
59249096370
-
Aura: A programming language for authorization and audit
-
Extended version U. Penn. Tech. Rep. MS-CIS-08-10
-
L. Jia, J. A. Vaughan, K. Mazurak, J. Zhao, L. Zarko, J. Schorr, S. Zdancewic. Aura: A programming language for authorization and audit. In ICFP '08, pp. 27-38. 2008. Extended version U. Penn. Tech. Rep. MS-CIS-08-10.
-
(2008)
ICFP '08
, pp. 27-38
-
-
Jia, L.1
Vaughan, J.A.2
Mazurak, K.3
Zhao, J.4
Zarko, L.5
Schorr, J.6
Zdancewic, S.7
-
21
-
-
79952153947
-
Modal proofs as distributed programs (extended abstract)
-
Full version Princeton Tech. Rep. TR-671-03
-
L. Jia, D. Walker. Modal proofs as distributed programs (extended abstract). In ESOP '04. 2004. Full version Princeton Tech. Rep. TR-671-03.
-
(2004)
ESOP '04
-
-
Jia, L.1
Walker, D.2
-
22
-
-
70450285315
-
Encoding information flow in aura
-
L. Jia, S. Zdancewic. Encoding information flow in aura. In PLAS '09. 2009.
-
(2009)
PLAS '09
-
-
Jia, L.1
Zdancewic, S.2
-
23
-
-
26844509701
-
A type system for computationally secure information flow
-
Fundamentals of Computation Theory: 15th International Symposium, FCT 2005. Proceedings
-
P. Laud, V. Vene. A type system for computationally secure information flow. In FCT '05, pp. 365-377. Lübeck, Germany, 2005. (Pubitemid 41449464)
-
(2005)
Lecture Notes in Computer Science
, vol.3623
, pp. 365-377
-
-
Laud, P.1
Vene, V.2
-
24
-
-
33947630856
-
Encoding information flow in haskell
-
P. Li, S. Zdancewic. Encoding information flow in haskell. In CSFW '06. 2006.
-
(2006)
CSFW '06
-
-
Li, P.1
Zdancewic, S.2
-
25
-
-
72549083642
-
Fabric: A platform for secure distributed computation and storage
-
ACM, New York, NY, USA
-
J. Liu, M. D. George, K. Vikram, X. Qi, L. Waye, A. C. Myers. Fabric: a platform for secure distributed computation and storage. In SOSP '09: Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, pp. 321-334. ACM, New York, NY, USA, 2009.
-
(2009)
SOSP '09: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles
, pp. 321-334
-
-
Liu, J.1
George, M.D.2
Vikram, K.3
Qi, X.4
Waye, L.5
Myers, A.C.6
-
28
-
-
4544313887
-
A symmetric modal lambda calculus for distributed computing
-
IEEE Press
-
T. Murphy, VII, K. Crary, R. Harper, F. Pfenning. A symmetric modal lambda calculus for distributed computing. In LICS '04. IEEE Press, 2004.
-
(2004)
LICS '04
-
-
Murphy VII, T.1
Crary, K.2
Harper, R.3
Pfenning, F.4
-
30
-
-
84945246255
-
A judgmental reconstruction of modal logic
-
DOI 10.1017/S0960129501003322
-
F. Pfenning, R. Davies. A judgmental reconstruction of modal logic. In Mathematical. Structures in Comp. Sci., 11(4):511-540, 2001. (Pubitemid 33303507)
-
(2001)
MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE
, vol.11
, Issue.4
, pp. 511-540
-
-
Pfenning, F.1
Davies, R.2
-
33
-
-
34547244658
-
Secure information flow with random assignment and encryption
-
Alexandria, Virgina, USA
-
G. Smith, R. Alpízar. Secure information flow with random assignment and encryption. In FSME'06, pp. 33-43. Alexandria, Virgina, USA, 2006.
-
(2006)
FSME'06
, pp. 33-43
-
-
Smith, G.1
Alpízar, R.2
-
34
-
-
2442514278
-
A bisimulation for dynamic sealing
-
E. Sumii, B. C. Pierce. A bisimulation for dynamic sealing. In POPL '04. 2004.
-
(2004)
POPL '04
-
-
Sumii, E.1
Pierce, B.C.2
-
35
-
-
77954739827
-
Enforcing stateful authorization and information flow policies in fine
-
N. Swamy, J. Chen, R. Chugh. Enforcing stateful authorization and information flow policies in Fine. In ESOP '10. 2010.
-
(2010)
ESOP '10
-
-
Swamy, N.1
Chen, J.2
Chugh, R.3
-
37
-
-
79952171906
-
-
Ph.D. thesis, University of Pennsylvania, Philadelphia, PA, USA
-
J. A. Vaughan. Aura: Programming with Authorization and Audit. Ph.D. thesis, University of Pennsylvania, Philadelphia, PA, USA, 2009.
-
(2009)
Aura: Programming with Authorization and Audit
-
-
Vaughan, J.A.1
-
38
-
-
51749116017
-
Evidence-based audit
-
Extended version U. Penn. Tech. Rep. MS-CIS-08-09
-
J. A. Vaughan, L. Jia, K. Mazurak, S. Zdancewic. Evidence-based audit. In CSF '08, pp. 177-191. 2008. Extended version U. Penn. Tech. Rep. MS-CIS-08-09.
-
(2008)
CSF '08
, pp. 177-191
-
-
Vaughan, J.A.1
Jia, L.2
Mazurak, K.3
Zdancewic, S.4
-
39
-
-
34548790762
-
A cryptographic decentralized label model
-
DOI 10.1109/SP.2007.5, 4223225, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
J. A. Vaughan, S. Zdancewic. A cryptographic decentralized label model. In IEEE Security and Privacy, pp. 192-206. Berkeley, California, 2007. (Pubitemid 47432527)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 192-206
-
-
Vaughan, J.A.1
Zdancewic, S.2
-
40
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, C. Irvine. A sound type system for secure flow analysis. In Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|