-
1
-
-
33745806932
-
A logic for information flow in object-oriented programs
-
T. Amtoft, S. Bandhakavi, and A. Banerjee, "A logic for information flow in object-oriented programs," in POPL, 2006.
-
(2006)
POPL
-
-
Amtoft, T.1
Bandhakavi, S.2
Banerjee, A.3
-
2
-
-
0033281265
-
Proof-carrying authentication
-
A. W. Appel and E. W. Felten, "Proof-carrying authentication," in ACM CCS, 1999.
-
(1999)
ACM CCS
-
-
Appel, A.W.1
Felten, E.W.2
-
3
-
-
34548715313
-
Gradual release: Unifying declassification, encryption and key release policies
-
A. Askarov and A. Sabelfeld, "Gradual release: Unifying declassification, encryption and key release policies," in IEEE Symp. Security and Privacy, 2007.
-
(2007)
IEEE Symp. Security and Privacy
-
-
Askarov, A.1
Sabelfeld, A.2
-
4
-
-
85040944657
-
A semantic framework for declassification and endorsement
-
A. Askarov and A. Myers, "A semantic framework for declassification and endorsement," in ESOP, 2010.
-
(2010)
ESOP
-
-
Askarov, A.1
Myers, A.2
-
5
-
-
77950852652
-
Distributed programming with distributed authorization
-
K. Avijit, A. Datta, and R. Harper, "Distributed programming with distributed authorization," in TLDI, 2010.
-
(2010)
TLDI
-
-
Avijit, K.1
Datta, A.2
Harper, R.3
-
6
-
-
17044429386
-
Stack-based access control and secure information flow
-
A. Banerjee and D. A. Naumann, "Stack-based access control and secure information flow," JFP, vol. 15, no. 2, pp. 131-177, 2005.
-
(2005)
JFP
, vol.15
, Issue.2
, pp. 131-177
-
-
Banerjee, A.1
Naumann, D.A.2
-
9
-
-
2442575906
-
Simple relational correctness proofs for static analyses and program transformations
-
N. Benton, "Simple relational correctness proofs for static analyses and program transformations," in POPL, 2004.
-
(2004)
POPL
-
-
Benton, N.1
-
10
-
-
79952125780
-
Verifying stateful programs with substructural state and hoare types
-
J. Borgstrom, J. Chen, and N. Swamy, "Verifying stateful programs with substructural state and Hoare types," in PLPV, 2011.
-
(2011)
PLPV
-
-
Borgstrom, J.1
Chen, J.2
Swamy, N.3
-
11
-
-
85177685244
-
Roles, stacks, histories: A triple for hoare
-
forthcoming
-
J. Borgström, A. D. Gordon, and R. Pucella, "Roles, stacks, histories: A triple for Hoare," JFP, forthcoming.
-
JFP
-
-
Borgström, J.1
Gordon, A.D.2
Pucella, R.3
-
12
-
-
77950913806
-
Paralocks: Role-based information flow control and beyond
-
N. Broberg and D. Sands, "Paralocks: role-based information flow control and beyond," in POPL, 2010.
-
(2010)
POPL
-
-
Broberg, N.1
Sands, D.2
-
13
-
-
85177680280
-
PCAL: Language support for proof-carrying authorization systems
-
A. Chaudhuri and D. Garg, "PCAL: Language support for proof-carrying authorization systems," in ESORICS, 2009.
-
(2009)
ESORICS
-
-
Chaudhuri, A.1
Garg, D.2
-
14
-
-
14844300105
-
Security policies for downgrading
-
S. Chong and A. C. Myers, "Security policies for downgrading," in ACM CCS, 2004.
-
(2004)
ACM CCS
-
-
Chong, S.1
Myers, A.C.2
-
15
-
-
28144458511
-
Language-based information erasure
-
-, "Language-based information erasure," in CSFW, 2005.
-
(2005)
CSFW
-
-
Chong, S.1
Myers, A.C.2
-
16
-
-
51749115761
-
End-to-end enforcement of erasure and declassification
-
-, "End-to-end enforcement of erasure and declassification," in CSF, 2008.
-
(2008)
CSF
-
-
Chong, S.1
Myers, A.C.2
-
17
-
-
0016949746
-
A lattice model of secure information flow
-
D. Denning, "A lattice model of secure information flow," CACM, vol. 19, no. 5, pp. 236-242, 1976.
-
(1976)
CACM
, vol.19
, Issue.5
, pp. 236-242
-
-
Denning, D.1
-
19
-
-
3142732675
-
A type-theoretic approach to higher-order modules with sharing
-
R. Harper and M. Lillibridge, "A type-theoretic approach to higher-order modules with sharing," in POPL, 1994.
-
(1994)
POPL
-
-
Harper, R.1
Lillibridge, M.2
-
20
-
-
59249096370
-
AURA: A programming language for authorization and audit
-
L. Jia, J. A. Vaughan, K. Mazurak, J. Zhao, L. Zarko, J. Schorr, and S. Zdancewic, "AURA: A programming language for authorization and audit," in ICFP, 2008.
-
(2008)
ICFP
-
-
Jia, L.1
Vaughan, J.A.2
Mazurak, K.3
Zhao, J.4
Zarko, L.5
Schorr, J.6
Zdancewic, S.7
-
21
-
-
70450285315
-
Encoding information flow in aura
-
L. Jia and S. Zdancewic, "Encoding information flow in Aura," in PLAS, 2009.
-
(2009)
PLAS
-
-
Jia, L.1
Zdancewic, S.2
-
22
-
-
0028013809
-
Manifest types, modules, and separate compilation
-
X. Leroy, "Manifest types, modules, and separate compilation," in POPL, 1994.
-
(1994)
POPL
-
-
Leroy, X.1
-
23
-
-
77949484835
-
Arrows for secure information flow
-
P. Li and S. Zdancewic, "Arrows for secure information flow," Theoretical Comput. Sci., vol. 411, no. 19, pp. 1974-1994, 2010.
-
(2010)
Theoretical Comput. Sci.
, vol.411
, Issue.19
, pp. 1974-1994
-
-
Li, P.1
Zdancewic, S.2
-
24
-
-
0003882263
-
Intuitionistic type theory
-
P. Martin-Löf, Intuitionistic Type Theory. Bibliopolis, 1984.
-
(1984)
Bibliopolis
-
-
Martin-Löf, P.1
-
25
-
-
57049139521
-
-
LogiCal project, INRIA version 8.2. [Online]
-
The Coq development team, The Coq proof assistant reference manual, LogiCal project, INRIA, 2009, version 8.2. [Online]. Available: http://coq.inria.fr
-
(2009)
The Coq Proof Assistant Reference Manual
-
-
-
26
-
-
0024038082
-
Abstract types have existential type
-
J. C. Mitchell and G. D. Plotkin, "Abstract types have existential type," ACM Trans. Prog. Lang. Syst., vol. 10, no. 3, pp. 470-502, 1988.
-
(1988)
ACM Trans. Prog. Lang. Syst.
, vol.10
, Issue.3
, pp. 470-502
-
-
Mitchell, J.C.1
Plotkin, G.D.2
-
27
-
-
78249262079
-
Security-typed programming within dependently-typed programming
-
J. Morgenstern and D. Licata, "Security-typed programming within dependently-typed programming," in ICFP, 2010.
-
(2010)
ICFP
-
-
Morgenstern, J.1
Licata, D.2
-
28
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
A. C. Myers, "JFlow: Practical mostly-static information flow control," in POPL, 1999.
-
(1999)
POPL
-
-
Myers, A.C.1
-
29
-
-
85177670669
-
Verification of information flow and access control policies via dependent types
-
A. Nanevski, A. Banerjee, and D. Garg, "Verification of information flow and access control policies via dependent types," IMDEA Software Iinstitute, Tech. Rep. IMDEA-SW- TR-2010.0, 2010.
-
(2010)
IMDEA Software Iinstitute, Tech. Rep. IMDEA-SW- TR-2010.0
-
-
Nanevski, A.1
Banerjee, A.2
Garg, D.3
-
30
-
-
59249093515
-
Ynot: Dependent types for imperative programs
-
A. Nanevski, G. Morrisett, A. Shinnar, P. Govereau, and L. Birkedal, "Ynot: Dependent types for imperative programs," in ICFP, 2008.
-
(2008)
ICFP
-
-
Nanevski, A.1
Morrisett, G.2
Shinnar, A.3
Govereau, P.4
Birkedal, L.5
-
31
-
-
55249085443
-
Hoare type theory, polymorphism and separation
-
A. Nanevski, J. G. Morrisett, and L. Birkedal, "Hoare type theory, polymorphism and separation," JFP, vol. 18, no. 5-6, pp. 865-911, 2008.
-
(2008)
JFP
, vol.18
, Issue.5-6
, pp. 865-911
-
-
Nanevski, A.1
Morrisett, J.G.2
Birkedal, L.3
-
32
-
-
77950885453
-
Structuring the verification of heap-manipulating programs
-
A. Nanevski, V. Vafeiadis, and J. Berdine, "Structuring the verification of heap-manipulating programs," in POPL, 2010.
-
(2010)
POPL
-
-
Nanevski, A.1
Vafeiadis, V.2
Berdine, J.3
-
34
-
-
0027271331
-
Imperative functional programming
-
S. L. Peyton Jones and P. Wadler, "Imperative functional programming," in POPL, 1993.
-
(1993)
POPL
-
-
Peyton Jones, S.L.1
Wadler, P.2
-
35
-
-
0036051192
-
Separation logic: A logic for shared mutable data structures
-
J. C. Reynolds, "Separation logic: a logic for shared mutable data structures," in LICS, 2002.
-
(2002)
LICS
-
-
Reynolds, J.C.1
-
36
-
-
80052003246
-
A library for lightweight information-flow security in haskell
-
A. Russo, K. Claessen, and J. Hughes, "A library for lightweight information-flow security in Haskell," in Haskell Symposium, 2008.
-
(2008)
Haskell Symposium
-
-
Russo, A.1
Claessen, K.2
Hughes, J.3
-
37
-
-
77954931906
-
Tracking information flow in dynamic tree structures
-
A. Russo, A. Sabelfeld, and A. Chudnov, "Tracking information flow in dynamic tree structures," in ESORICS, 2009.
-
(2009)
ESORICS
-
-
Russo, A.1
Sabelfeld, A.2
Chudnov, A.3
-
38
-
-
0002185174
-
A PER model of secure information flow in sequential programs
-
A. Sabelfeld and D. Sands, "A PER model of secure information flow in sequential programs," in ESOP, 1999.
-
(1999)
ESOP
-
-
Sabelfeld, A.1
Sands, D.2
-
39
-
-
70350548311
-
Declassification: Dimensions and principles
-
-, "Declassification: Dimensions and principles," Journal of Computer Security, vol. 17, no. 5, pp. 517-548, 2009.
-
(2009)
Journal of Computer Security
, vol.17
, Issue.5
, pp. 517-548
-
-
Sabelfeld, A.1
Sands, D.2
-
40
-
-
0346925420
-
Fine-grained information flow analysis for a λ-calculus with sum types
-
V. Simonet, "Fine-grained information flow analysis for a λ-calculus with sum types," in CSFW, 2002.
-
(2002)
CSFW
-
-
Simonet, V.1
-
41
-
-
85040949627
-
Enforcing stateful authorization and information flow policies in fine
-
N. Swamy, J. Chen, and R. Chugh, "Enforcing stateful authorization and information flow policies in Fine," in ESOP, 2010.
-
(2010)
ESOP
-
-
Swamy, N.1
Chen, J.2
Chugh, R.3
-
42
-
-
50249112702
-
Fable: A language for enforcing user-defined security policies
-
full version: Technical report CS-TR-4895, Univ. Maryland
-
N. Swamy, B. J. Corcoran, and M. Hicks, "Fable: A language for enforcing user-defined security policies," in IEEE Symp. Security and Privacy, 2008, full version: Technical report CS-TR-4895, Univ. Maryland.
-
(2008)
IEEE Symp. Security and Privacy
-
-
Swamy, N.1
Corcoran, B.J.2
Hicks, M.3
-
43
-
-
33947711323
-
Managing policy updates in security-typed languages
-
N. Swamy, M. Hicks, S. Tse, and S. Zdancewic, "Managing policy updates in security-typed languages," in CSFW, 2006.
-
(2006)
CSFW
-
-
Swamy, N.1
Hicks, M.2
Tse, S.3
Zdancewic, S.4
-
44
-
-
33746340860
-
Secure information flow as a safety problem
-
T. Terauchi and A. Aiken, "Secure information flow as a safety problem," in SAS, 2005.
-
(2005)
SAS
-
-
Terauchi, T.1
Aiken, A.2
-
45
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. M. Volpano, C. E. Irvine, and G. Smith, "A sound type system for secure flow analysis," Journal of Computer Security, vol. 4, no. 2/3, pp. 167-188, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-188
-
-
Volpano, D.M.1
Irvine, C.E.2
Smith, G.3
-
46
-
-
34047152892
-
Relational separation logic
-
DOI 10.1016/j.tcs.2006.12.036, PII S0304397506009261
-
H. Yang, "Relational separation logic," Theoretical Comput. Sci., vol. 375, pp. 308-334, 2007. (Pubitemid 46528654)
-
(2007)
Theoretical Computer Science
, vol.375
, Issue.1-3
, pp. 308-334
-
-
Yang, H.1
-
47
-
-
1442332519
-
A semantic basis for local reasoning
-
H. Yang and P. W. O'Hearn, "A semantic basis for local reasoning," in FoSSaCS, 2002.
-
(2002)
FoSSaCS
-
-
Yang, H.1
O'Hearn, P.W.2
|