메뉴 건너뛰기




Volumn , Issue , 2011, Pages 95-106

Flexible dynamic information flow control in Haskell

Author keywords

information flow control; library; monad

Indexed keywords

DISCRETIONARY ACCESS CONTROL; FLEXIBLE DYNAMICS; HASKELL; INFORMATION FLOW CONTROL; MONAD;

EID: 82655162714     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2034675.2034688     Document Type: Conference Paper
Times cited : (85)

References (40)
  • 3
    • 84861526479 scopus 로고    scopus 로고
    • Parameterised notions of computation. In Workshop on mathematically structured functional programming
    • ed. Conor McBride and Tarmo Uustalu. British Computer Society
    • R. Atkey. Parameterised notions of computation. In Workshop on mathematically structured functional programming, ed. Conor McBride and Tarmo Uustalu. Electronic Workshops in Computing, British Computer Society, pages 31-45, 2006.
    • (2006) Electronic Workshops in Computing , pp. 31-45
    • Atkey, R.1
  • 4
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based access control and secure information flow
    • A. Banerjee and D. Naumann. Stack-based access control and secure information flow. Journal of Functional Programming, 15(02):131-177, 2005.
    • (2005) Journal of Functional Programming , vol.15 , Issue.2 , pp. 131-177
    • Banerjee, A.1    Naumann, D.2
  • 8
    • 17044427985 scopus 로고    scopus 로고
    • A monadic analysis of information flow security with mutable state
    • March
    • K. Crary, A. Kliger, and F. Pfenning. A monadic analysis of information flow security with mutable state. Journal of Functional Programming, 15:249-291, March 2005.
    • (2005) Journal of Functional Programming , vol.15 , pp. 249-291
    • Crary, K.1    Kliger, A.2    Pfenning, F.3
  • 9
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 10
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 16
    • 28144451172 scopus 로고    scopus 로고
    • Achieving information flow security through precise control of effects
    • IEEE Computer Society
    • W. L. Harrison. Achieving information flow security through precise control of effects. In In 18th IEEE Computer Security Foundations Workshop, pages 16-30. IEEE Computer Society, 2005.
    • (2005) 18th IEEE Computer Security Foundations Workshop , pp. 16-30
    • Harrison, W.L.1
  • 19
    • 0033751744 scopus 로고    scopus 로고
    • Generalising monads to arrows
    • J. Hughes. Generalising monads to arrows. Science of Computer Programming, 37(1-3):67-111, 2000.
    • (2000) Science of Computer Programming , vol.37 , Issue.1-3 , pp. 67-111
    • Hughes, J.1
  • 22
    • 0019608720 scopus 로고
    • Formal models for computer security
    • September
    • C. E. Landwehr. Formal models for computer security. Computing Survels, 13(3):247-278, September 1981.
    • (1981) Computing Survels , vol.13 , Issue.3 , pp. 247-278
    • Landwehr, C.E.1
  • 26
    • 77949484835 scopus 로고    scopus 로고
    • Arrows for secure information flow
    • P. Li and S. Zdancewic. Arrows for secure information flow. Theoretical Computer Science, 411(19):1974-1994, 2010.
    • (2010) Theoretical Computer Science , vol.411 , Issue.19 , pp. 1974-1994
    • Li, P.1    Zdancewic, S.2
  • 29
    • 0001048139 scopus 로고    scopus 로고
    • Protecting privacy using the decentralized label model
    • October
    • A. C. Myers and B. Liskov. Protecting privacy using the decentralized label model. ACM Trans. on Computer Systems, 9(4):410-442, October 2000.
    • (2000) ACM Trans. on Computer Systems , vol.9 , Issue.4 , pp. 410-442
    • Myers, A.C.1    Liskov, B.2
  • 35
    • 33646091639 scopus 로고    scopus 로고
    • Software release. Located at July
    • V. Simonet. The Flow Caml system. Software release. Located at http://cristal.inria.fr/~simonet/soft/flowcaml/, July 2003.
    • (2003) The Flow Caml System
    • Simonet, V.1
  • 37
    • 37049002830 scopus 로고    scopus 로고
    • Labels and event processes in the Asbestos operating system
    • 11 December A version appeared in Proc. of the 20th ACM Symp. on Operating System Principles, 2005
    • S. VanDeBogart, P. Efstathopoulos, E. Kohler, M. Krohn, C. Frey, D. Ziegler, F. Kaashoek, R. Morris, and D.Mazières. Labels and event processes in the Asbestos operating system. ACM Trans. on Computer Systems, 25(4):11:1-43, December 2007. A version appeared in Proc. of the 20th ACM Symp. on Operating System Principles, 2005.
    • (2007) ACM Trans. on Computer Systems , vol.25 , Issue.4 , pp. 1-43
    • VanDeBogart, S.1    Efstathopoulos, P.2    Kohler, E.3    Krohn, M.4    Frey, C.5    Ziegler, D.6    Kaashoek, F.7    Morris, R.8    Mazières, D.9
  • 38
    • 0033330060 scopus 로고    scopus 로고
    • Probabilistic noninterference in a concurrent language. J
    • Nov.
    • D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. J. Computer Security, 7(2-3), Nov. 1999.
    • (1999) Computer Security , vol.7 , Issue.2-3
    • Volpano, D.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.