-
1
-
-
0018585421
-
Lisp machine
-
Winston PH, (ed.) MIT Press, Cambridge
-
Bawden A, Greenblatt RD, Holloway J, Knight TF, Moon D, and Weinreb D. Lisp machine. Artificial Intelligence, pages 343-373, 1979. Winston PH, (ed.), v. 2, MIT Press, Cambridge.
-
(1979)
Artificial Intelligence
, vol.2
, pp. 343-373
-
-
Bawden, A.1
Greenblatt, R.D.2
Holloway, J.3
Knight, T.F.4
Moon, D.5
Weinreb, D.6
-
2
-
-
79959879431
-
Efficient purely-dynamic information flow analysis
-
December
-
Thomas H. Austin and Cormac Flanagan. Efficient purely-dynamic information flow analysis. SIGPLAN Notices, 44:20-31, December 2009.
-
(2009)
SIGPLAN Notices
, vol.44
, pp. 20-31
-
-
Austin, T.H.1
Flanagan, C.2
-
3
-
-
35248874819
-
A capability representation with embedded address and nearly-exact object bounds
-
April Aries Project
-
J. Brown, J.P. Grossman, A. Huang, and Jr. T. F. Knight. A capability representation with embedded address and nearly-exact object bounds. Technical Report 5, MIT AI Lab, April 2000. Aries Project.
-
(2000)
Technical Report 5, MIT AI Lab
-
-
Brown, J.1
Grossman, J.P.2
Huang, A.3
Knight Jr., T.F.4
-
4
-
-
80955138632
-
-
Submitted for publication
-
Winnie Cheng, Aaron Blankstein, James Cowling, Dorothy Curtis, Vicky Popic, Dan R. K. Ports, David Schultz, Liuba Shrira, and Barbara Liskov. Abstractions for usable information flow control in Aeolus. Submitted for publication.
-
Abstractions for Usable Information Flow Control in Aeolus
-
-
Cheng, W.1
Blankstein, A.2
Cowling, J.3
Curtis, D.4
Popic, V.5
Ports, D.R.K.6
Schultz, D.7
Shrira, L.8
Liskov, B.9
-
5
-
-
0024067295
-
Performance effects of architectural complexity in the intel 432
-
August
-
Robert P. Colwell, Edward F. Gehringer, and E. Douglas Jensen. Performance effects of architectural complexity in the Intel 432. ACM Trans. Comput. Syst., 6:296-339, August 1988.
-
(1988)
ACM Trans. Comput. Syst.
, vol.6
, pp. 296-339
-
-
Colwell, R.P.1
Gehringer, E.F.2
Douglas, J.E.3
-
6
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning. A lattice model of secure information flow. Commun. ACM, 19:236-243, May 1976.
-
(1976)
Commun. ACM
, vol.19
, pp. 236-243
-
-
Denning, D.E.1
-
7
-
-
0021473522
-
Intel 432: A VLSI architecture for fault-tolerant computer systems
-
D. Johnson. The intel 432: A VLSI architecture for fault-tolerant computer systems. Computer, 17:40-48, August 1984. (Pubitemid 14601082)
-
(1984)
Computer
, vol.17
, Issue.8
, pp. 40-48
-
-
Johnson, D.1
-
8
-
-
58449135488
-
Implicit flows: Can't live with 'em, can't live without 'em
-
Dave King, Boniface Hicks, Michael Hicks, and Trent Jaeger. Implicit flows: Can't live with 'em, can't live without 'em. In Proceedings of the 4th International Conference on Information Systems Security (ICISS 2008), pages 56-70, 2008.
-
(2008)
Proceedings of the 4th International Conference on Information Systems Security (ICISS 2008)
, pp. 56-70
-
-
King, D.1
Hicks, B.2
Hicks, M.3
Jaeger, T.4
-
9
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
ACM
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. seL4: Formal verification of an OS kernel. In ACM SOSP, pages 207-220. ACM, 2009.
-
(2009)
ACM SOSP
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
10
-
-
84900011269
-
Information flow control for standard OS abstractions
-
E. K. Stevenson, Washington, USA, October
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. K., and R. Morris. Information flow control for standard OS abstractions. In ACM SOSP, Stevenson, Washington, USA, October 2007.
-
(2007)
ACM SOSP
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Morris, R.6
-
11
-
-
67650088351
-
Formal verification of a realistic compiler
-
Xavier Leroy. Formal verification of a realistic compiler. Comm. of the ACM, 52(7):107-115, 2009.
-
(2009)
Comm. of the ACM
, vol.52
, Issue.7
, pp. 107-115
-
-
Leroy, X.1
-
13
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
October
-
A. C. Myers and B. Liskov. Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol., 9:410-442, October 2000.
-
(2000)
ACM Trans. Softw. Eng. Methodol.
, vol.9
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
-
14
-
-
0016081584
-
Protection and the control of information sharing in multics
-
July
-
Jerome H. Saltzer. Protection and the control of information sharing in multics. Communications of the ACM, 17(7):388-402, July 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 388-402
-
-
Saltzer, J.H.1
-
16
-
-
77954740490
-
Safe to the last instruction: Automated verification of a type-safe operating system
-
Toronto, Ontario, Canada, June
-
Jean Yang and Chris Hawblitzel. Safe to the last instruction: Automated verification of a type-safe operating system. In Proceedings of PLDI'2010, Toronto, Ontario, Canada, June 2010.
-
(2010)
Proceedings of PLDI'2010
-
-
Yang, J.1
Hawblitzel, C.2
-
17
-
-
80955153441
-
Improving application security with data flow assertions
-
Big Sky, MT, USA, October
-
Alexander Yip, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek. Improving application security with data flow assertions. In ACM SOSP, Big Sky, MT, USA, October 2009.
-
(2009)
ACM SOSP
-
-
Yip, A.1
Xi, W.2
Zeldovich, N.3
Frans Kaashoek, M.4
|