-
1
-
-
79960516658
-
-
Object security site, 2001. http://www.objectsecurity.com.
-
(2001)
-
-
-
2
-
-
79960526941
-
-
web site
-
Jif web site, 2002. http://www.cs.cornell.edu/jif/.
-
(2002)
Jif
-
-
-
5
-
-
79960529956
-
-
Enhancing IT Security with Trusted Computing Group, November
-
Enhancing IT Security with Trusted Computing Group, November 2006. Dell Power Solutions.
-
(2006)
Dell Power Solutions
-
-
-
6
-
-
79960546206
-
-
web site
-
OSOA web site, 2007. http://www.osoa.org/.
-
(2007)
-
-
-
8
-
-
33746364838
-
Cryptographically sound implementations for communicating processes
-
Springer
-
P. Adão and C. Fournet. Cryptographically sound implementations for communicating processes. In ICALP (2), pages 83-94. Springer, 2006.
-
(2006)
ICALP
, Issue.2
, pp. 83-94
-
-
Adão, P.1
Fournet, C.2
-
9
-
-
33745471209
-
Model driven security: From uml models to access control infrastructures
-
D. Basin, J. Doser, and T. Lodderstedt. Model driven security: From uml models to access control infrastructures. ACM Trans. Softw. Eng. Methodol., 15(1):39-91, 2006.
-
(2006)
ACM Trans. Softw. Eng. Methodol.
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
10
-
-
35148859587
-
SCA service component architecture-assembly model specification
-
November
-
M. Beisiegel, H. Blohm, D. Booz, M. Edwards, O. Hurley, S. Ielceanu, A. Miller, A. Karmarkar, A. Malhotra, and J. Marino. SCA service component architecture-assembly model specification. SCA Version 0.9, November, 2005.
-
(2005)
SCA Version 0.9
-
-
Beisiegel, M.1
Blohm, H.2
Booz, D.3
Edwards, M.4
Hurley, O.5
Ielceanu, S.6
Miller, A.7
Karmarkar, A.8
Malhotra, A.9
Marino, J.10
-
11
-
-
0003400251
-
-
Technical Report ESD-TR-75-306, MITRE Corp. MTR-2997, Bedford, MA, Available at NTIS AD-A023 588
-
D. E. Bell and L. J. LaPadula. Secure computer system: Unified exposition and multics interpretation. Technical Report ESD-TR-75-306, MITRE Corp. MTR-2997, Bedford, MA, 1975. Available at NTIS AD-A023 588.
-
(1975)
Secure Computer System: Unified Exposition and Multics Interpretation
-
-
Bell, D.E.1
LaPadula, L.J.2
-
13
-
-
79960516227
-
Using jason to secure soa
-
L. Chmielewski, R. Brinkman, J.-H. Hoepman, and B. Bos. Using jason to secure soa. In Middleware Security, pages 13-18, 2008.
-
(2008)
Middleware Security
, pp. 13-18
-
-
Chmielewski, L.1
Brinkman, R.2
Hoepman, J.-H.3
Bos, B.4
-
15
-
-
38349010576
-
Computationally sound typing for non-interference: The case of deterministic encryption
-
Berlin, Heidelberg, Springer-Verlag
-
J. Courant, C. Ene, and Y. Lakhnech. Computationally sound typing for non-interference: the case of deterministic encryption. In Proceedings of the 27th international conference on Foundations of software technology and theoretical computer science, FSTTCS'07, pages 364-375, Berlin, Heidelberg, 2007. Springer-Verlag.
-
(2007)
Proceedings of the 27th International Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS'07
, pp. 364-375
-
-
Courant, J.1
Ene, C.2
Lakhnech, Y.3
-
16
-
-
0017517624
-
Certification of programs for secure information flow
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Commun. ACM, 20(7):504-513, 1977.
-
(1977)
Commun. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
17
-
-
33845414042
-
Labels and event processes in the asbestos operating system
-
DOI 10.1145/1095809.1095813
-
P. Efstathopoulosssssssssssssss, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the asbestos operating system. SIGOPS Oper. Syst. Rev., 39(5):17-30, 2005. (Pubitemid 44892202)
-
(2005)
Operating Systems Review (ACM)
, vol.39
, Issue.5
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazieres, D.7
Kaashoek, F.8
Morris, R.9
-
18
-
-
79960505691
-
Event-processing middleware with information flow control
-
New York, NY, USA, Springer-Verlag New York, Inc.
-
D. M. Eyers, B. Roberts, J. Bacon, I. Papagiannis, M. Migliavacca, P. Pietzuch, and B. Shand. Event-processing middleware with information flow control. In Middleware '09: Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware, pages 1-2, New York, NY, USA, 2009. Springer-Verlag New York, Inc.
-
(2009)
Middleware '09: Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware
, pp. 1-2
-
-
Eyers, D.M.1
Roberts, B.2
Bacon, J.3
Papagiannis, I.4
Migliavacca, M.5
Pietzuch, P.6
Shand, B.7
-
19
-
-
74049141339
-
A security-preserving compiler for distributed programs: From information-flow policies to cryptographic mechanisms
-
New York, USA, ACM
-
C. Fournet, G. Le Guernic, and T. Rezk. A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, pages 432-441, New York, USA, 2009. ACM.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 432-441
-
-
Fournet, C.1
Le Guernic, G.2
Rezk, T.3
-
20
-
-
84865659111
-
Cryptographically sound implementations for typed information-flow security
-
ACM
-
C. Fournet and T. Rezk. Cryptographically sound implementations for typed information-flow security. In POPL, pages 323-335. ACM, 2008.
-
(2008)
POPL
, pp. 323-335
-
-
Fournet, C.1
Rezk, T.2
-
22
-
-
0031701347
-
The slam calculus: Programming with secrecy and integrity
-
N. Heintze and J. G. Riecke. The slam calculus: Programming with secrecy and integrity. In POPL, pages 365-377, 1998.
-
(1998)
POPL
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.G.2
-
23
-
-
47149101814
-
Information flow control for standard os abstractions
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information flow control for standard os abstractions. SIGOPS Oper. Syst. Rev., 41(6):321-334, 2007.
-
(2007)
SIGOPS Oper. Syst. Rev.
, vol.41
, Issue.6
, pp. 321-334
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
24
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
London, UK, Springer-Verlag
-
P. Laud. Semantics and program analysis of computationally secure information flow. In Proceedings of the 10th European Symposium on Programming Languages and Systems, ESOP '01, pages 77-91, London, UK, 2001. Springer-Verlag.
-
(2001)
Proceedings of the 10th European Symposium on Programming Languages and Systems, ESOP '01
, pp. 77-91
-
-
Laud, P.1
-
25
-
-
46449095888
-
On the computational soundness of cryptographically masked flows
-
New York, NY, USA, ACM
-
P. Laud. On the computational soundness of cryptographically masked flows. In Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, POPL '08, pages 337-348, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 35th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '08
, pp. 337-348
-
-
Laud, P.1
-
28
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. M. Volpano, C. E. Irvine, and G. Smith. A sound type system for secure flow analysis. Journal of Computer Security, 4(2/3):167-188, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-188
-
-
Volpano, D.M.1
Irvine, C.E.2
Smith, G.3
-
30
-
-
0037974191
-
Secure program partitioning
-
S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers. Secure program partitioning. ACM Trans. Comput. Syst., 20(3):283-328, 2002.
-
(2002)
ACM Trans. Comput. Syst.
, vol.20
, Issue.3
, pp. 283-328
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.C.4
-
31
-
-
84888352157
-
Making information flow explicit in histar
-
Berkeley, CA, USA, USENIX Association
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazières. Making information flow explicit in histar. In OSDI '06: Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, pages 19-19, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
OSDI '06: Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation
, pp. 19-19
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
-
32
-
-
85094632142
-
Securing distributed systems with information flow control
-
Berkeley, CA, USA, USENIX Association
-
N. Zeldovich, S. B. Wickizer, and D. Mazières. Securing distributed systems with information flow control. In NSDI'08: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, pages 293-308, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
NSDI'08: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
, pp. 293-308
-
-
Zeldovich, N.1
Wickizer, S.B.2
Mazières, D.3
|