-
1
-
-
0032681509
-
A Core Calculus of Dependency
-
Jan.
-
M. Abadi, A. Banerjee, N. Heintze, and J. Riecke. A Core Calculus of Dependency. In Proc. ACM Symp. on Principles of Programming Languages, pages 147-160, Jan. 1999.
-
(1999)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.4
-
2
-
-
57049111067
-
Terminationinsensitive noninterference leaks more than just a bit
-
Springer-Verlag
-
A. Askarov, S. Hunt, A. Sabelfeld, and D. Sands. Terminationinsensitive noninterference leaks more than just a bit. In Proc. of the 13th European Symp. on Research in Computer Security, pages 333-348. Springer-Verlag, 2008.
-
(2008)
Proc. of the 13th European Symp. on Research in Computer Security
, pp. 333-348
-
-
Askarov, A.1
Hunt, S.2
Sabelfeld, A.3
Sands, D.4
-
3
-
-
84861526479
-
Parameterised notions of computation. In Workshop on mathematically structured functional programming
-
ed. Conor McBride and Tarmo Uustalu. British Computer Society
-
R. Atkey. Parameterised notions of computation. In Workshop on mathematically structured functional programming, ed. Conor McBride and Tarmo Uustalu. Electronic Workshops in Computing, British Computer Society, pages 31-45, 2006.
-
(2006)
Electronic Workshops in Computing
, pp. 31-45
-
-
Atkey, R.1
-
4
-
-
17044429386
-
Stack-based access control and secure information flow
-
A. Banerjee and D. Naumann. Stack-based access control and secure information flow. Journal of Functional Programming, 15(02):131-177, 2005.
-
(2005)
Journal of Functional Programming
, vol.15
, Issue.2
, pp. 131-177
-
-
Banerjee, A.1
Naumann, D.2
-
5
-
-
0003400251
-
-
Technical Report MTR-2997, Rev. 1, MITRE Corp., Bedford, MA, March
-
D. E. Bell and L. L. Padula. Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997, Rev. 1, MITRE Corp., Bedford, MA, March 1976.
-
(1976)
Secure Computer System: Unified Exposition and Multics Interpretation
-
-
Bell, D.E.1
Padula, L.L.2
-
8
-
-
17044427985
-
A monadic analysis of information flow security with mutable state
-
March
-
K. Crary, A. Kliger, and F. Pfenning. A monadic analysis of information flow security with mutable state. Journal of Functional Programming, 15:249-291, March 2005.
-
(2005)
Journal of Functional Programming
, vol.15
, pp. 249-291
-
-
Crary, K.1
Kliger, A.2
Pfenning, F.3
-
9
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
10
-
-
0017517624
-
Certification of programs for secure information flow
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
12
-
-
79952121674
-
Information flow enforcement in monadic libraries
-
ACM
-
D. Devriese and F. Piessens. Information flow enforcement in monadic libraries. In Proc. of the 7th ACM SIGPLAN Workshop on Types in Language Design and Implementation, New York, NY, USA, 2011. ACM.
-
Proc. of the 7th ACM SIGPLAN Workshop on Types in Language Design and Implementation, New York, NY, USA, 2011
-
-
Devriese, D.1
Piessens, F.2
-
13
-
-
82655183930
-
-
October
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system, October 2005.
-
(2005)
Labels and Event Processes in the Asbestos Operating System
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
16
-
-
28144451172
-
Achieving information flow security through precise control of effects
-
IEEE Computer Society
-
W. L. Harrison. Achieving information flow security through precise control of effects. In In 18th IEEE Computer Security Foundations Workshop, pages 16-30. IEEE Computer Society, 2005.
-
(2005)
18th IEEE Computer Security Foundations Workshop
, pp. 16-30
-
-
Harrison, W.L.1
-
19
-
-
0033751744
-
Generalising monads to arrows
-
J. Hughes. Generalising monads to arrows. Science of Computer Programming, 37(1-3):67-111, 2000.
-
(2000)
Science of Computer Programming
, vol.37
, Issue.1-3
, pp. 67-111
-
-
Hughes, J.1
-
21
-
-
57749192483
-
-
October
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information flow control for standard OS abstractions, October 2007.
-
(2007)
Information Flow Control for Standard OS Abstractions
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
22
-
-
0019608720
-
Formal models for computer security
-
September
-
C. E. Landwehr. Formal models for computer security. Computing Survels, 13(3):247-278, September 1981.
-
(1981)
Computing Survels
, vol.13
, Issue.3
, pp. 247-278
-
-
Landwehr, C.E.1
-
26
-
-
77949484835
-
Arrows for secure information flow
-
P. Li and S. Zdancewic. Arrows for secure information flow. Theoretical Computer Science, 411(19):1974-1994, 2010.
-
(2010)
Theoretical Computer Science
, vol.411
, Issue.19
, pp. 1974-1994
-
-
Li, P.1
Zdancewic, S.2
-
29
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
October
-
A. C. Myers and B. Liskov. Protecting privacy using the decentralized label model. ACM Trans. on Computer Systems, 9(4):410-442, October 2000.
-
(2000)
ACM Trans. on Computer Systems
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
-
35
-
-
33646091639
-
-
Software release. Located at July
-
V. Simonet. The Flow Caml system. Software release. Located at http://cristal.inria.fr/~simonet/soft/flowcaml/, July 2003.
-
(2003)
The Flow Caml System
-
-
Simonet, V.1
-
37
-
-
37049002830
-
Labels and event processes in the Asbestos operating system
-
11 December A version appeared in Proc. of the 20th ACM Symp. on Operating System Principles, 2005
-
S. VanDeBogart, P. Efstathopoulos, E. Kohler, M. Krohn, C. Frey, D. Ziegler, F. Kaashoek, R. Morris, and D.Mazières. Labels and event processes in the Asbestos operating system. ACM Trans. on Computer Systems, 25(4):11:1-43, December 2007. A version appeared in Proc. of the 20th ACM Symp. on Operating System Principles, 2005.
-
(2007)
ACM Trans. on Computer Systems
, vol.25
, Issue.4
, pp. 1-43
-
-
VanDeBogart, S.1
Efstathopoulos, P.2
Kohler, E.3
Krohn, M.4
Frey, C.5
Ziegler, D.6
Kaashoek, F.7
Morris, R.8
Mazières, D.9
-
38
-
-
0033330060
-
Probabilistic noninterference in a concurrent language. J
-
Nov.
-
D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. J. Computer Security, 7(2-3), Nov. 1999.
-
(1999)
Computer Security
, vol.7
, Issue.2-3
-
-
Volpano, D.1
Smith, G.2
|