-
3
-
-
79959315082
-
Static information flow analysis of workflow models
-
GI Abramowicz, W., Alt, R., Fähnrich, K.P., Franczyk, B., Maciaszek, L.A. (eds.) ISSS/BPSC.
-
Accorsi, R., Wonnemann, C.: Static information flow analysis of workflow models. In: Abramowicz, W., Alt, R., Fähnrich, K.P., Franczyk, B., Maciaszek, L.A. (eds.) ISSS/BPSC. LNI, vol. 177, pp. 194-205. GI (2010)
-
(2010)
LNI
, vol.177
, pp. 194-205
-
-
Accorsi, R.1
Wonnemann, C.2
-
4
-
-
0005260169
-
-
Software release. Located at
-
Myers, A.C., Zheng, L., Zdancewic, S., Chong, S., Nystrom, N.: Jif:java + information flow (July 2001-2011), Software release. Located at, http://www.cs.cornell.edu/jif
-
Jif:java + Information Flow (July 2001-2011)
-
-
Myers, A.C.1
Zheng, L.2
Zdancewic, S.3
Chong, S.4
Nystrom, N.5
-
5
-
-
41649087956
-
-
WS-BPEL TC OASIS
-
Alves, A., Arkin, A., Askary, S., Barreto, C., Bloch, B., Curbera, F., Ford, M., Goland, Y., Guízar, A., Kartha, N., Liu, C.K., Khalaf, R., Koenig, D., Marin, M., Mehta, V., Thatte, S., Rijn, D., Yendluri, P., Yiu, A.:Web services business process execution language version 2.0 (OASIS standard). WS-BPEL TC OASIS (2007), http://docs.oasis-open.org/wsbpel/2.0/ wsbpel-v2.0.html
-
(2007)
Web Services Business Process Execution Language Version 2.0 (OASIS Standard)
-
-
Alves, A.1
Arkin, A.2
Askary, S.3
Barreto, C.4
Bloch, B.5
Curbera, F.6
Ford, M.7
Goland, Y.8
Guízar, A.9
Kartha, N.10
Liu, C.K.11
Khalaf, R.12
Koenig, D.13
Marin, M.14
Mehta, V.15
Thatte, S.16
Rijn, D.17
Yendluri, P.18
Yiu, A.19
-
6
-
-
57049111067
-
Termination-Insensitive Noninterference Leaks more than Just a Bit
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
-
Askarov, A., Hunt, S., Sabelfeld, A., Sands, D.: Termination-Insensitive Noninterference Leaks more than Just a Bit. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 333-348. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 333-348
-
-
Askarov, A.1
Hunt, S.2
Sabelfeld, A.3
Sands, D.4
-
7
-
-
85028639349
-
A static analyzer for large safety-critical software
-
abs/cs/0701193
-
Blanchet, B., Cousot, P., Cousot, R., Feret, J., Mauborgne, L., Miné, A., Monniaux, D., Rival, X.: A static analyzer for large safety-critical software. CoRR abs/cs/0701193 (2007)
-
(2007)
CoRR
-
-
Blanchet, B.1
Cousot, P.2
Cousot, R.3
Feret, J.4
Mauborgne, L.5
Miné, A.6
Monniaux, D.7
Rival, X.8
-
9
-
-
26944481746
-
Theoretical foundations for compensations in flow composition languages
-
Palsberg, J., Abadi, M. (eds.) ACM
-
Bruni, R., Melgratti, H.C., Montanari, U.: Theoretical foundations for compensations in flow composition languages. In: Palsberg, J., Abadi, M. (eds.) POPL, pp. 209-220. ACM (2005)
-
(2005)
POPL
, pp. 209-220
-
-
Bruni, R.1
Melgratti, H.C.2
Montanari, U.3
-
10
-
-
84877700103
-
SIF: Enforcing confidentiality and integrity in web applications
-
USENIX Association, Berkeley
-
Chong, S., Vikram, K., Myers, A.C.: SIF: enforcing confidentiality and integrity in web applications. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp. 1:1-1:16. USENIX Association, Berkeley (2007)
-
(2007)
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
-
-
Chong, S.1
Vikram, K.2
Myers, A.C.3
-
11
-
-
0016949746
-
A lattice model of secure information flow
-
Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236-243 (1976)
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
12
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504-513 (1977)
-
(1977)
Commun. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
13
-
-
35048820041
-
Automaton-based confidentiality monitoring of concurrent programs
-
IEEE Computer Society
-
Guernic, G.L.: Automaton-based confidentiality monitoring of concurrent programs. In: CSF, pp. 218-232. IEEE Computer Society (2007)
-
(2007)
CSF
, pp. 218-232
-
-
Guernic, G.L.1
-
14
-
-
77049098553
-
Sock: A Calculus for Service Oriented Computing
-
Dan, A., Lamersdorf, W. (eds.) ICSOC 2006. Springer, Heidelberg
-
Guidi, C., Lucchi, R., Gorrieri, R., Busi, N., Zavattaro, G.: Sock: A Calculus for Service Oriented Computing. In: Dan, A., Lamersdorf, W. (eds.) ICSOC 2006. LNCS, vol. 4294, pp. 327-338. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4294
, pp. 327-338
-
-
Guidi, C.1
Lucchi, R.2
Gorrieri, R.3
Busi, N.4
Zavattaro, G.5
-
15
-
-
70350572805
-
Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs
-
Hammer, C., Snelting, G.: Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. International Journal of Information Security 8(6), 399-422 (2009)
-
(2009)
International Journal of Information Security
, vol.8
, Issue.6
, pp. 399-422
-
-
Hammer, C.1
Snelting, G.2
-
16
-
-
27144536920
-
Transforming BPEL to Petri Nets
-
van der Aalst, W.M.P., Benatallah, B., Casati, F., Curbera, F. (eds.) BPM 2005. Springer, Heidelberg
-
Hinz, S., Schmidt, K., Stahl, C.: Transforming BPEL to Petri Nets. In: van der Aalst, W.M.P., Benatallah, B., Casati, F., Curbera, F. (eds.) BPM 2005. LNCS, vol. 3649, pp. 220-235. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3649
, pp. 220-235
-
-
Hinz, S.1
Schmidt, K.2
Stahl, C.3
-
17
-
-
84963550988
-
On the adequacy of program dependence graphs for representing programs
-
ACM, New York
-
Horwitz, S., Prins, J., Reps, T.: On the adequacy of program dependence graphs for representing programs. In: POPL 1988: Proceedings of the 15th ACM SIGPLANSIGACT Symposium on Principles of Programming Languages, pp. 146-157. ACM, New York (1988)
-
(1988)
POPL 1988: Proceedings of the 15th ACM SIGPLANSIGACT Symposium on Principles of Programming Languages
, pp. 146-157
-
-
Horwitz, S.1
Prins, J.2
Reps, T.3
-
18
-
-
33947654823
-
Transformational typing and unification for automatically correcting insecure programs
-
Köpf, B., Mantel, H.: Transformational typing and unification for automatically correcting insecure programs. Int. J. Inf. Sec. 6(2-3), 107-131 (2007)
-
(2007)
Int. J. Inf. Sec.
, vol.6
, Issue.2-3
, pp. 107-131
-
-
Köpf, B.1
Mantel, H.2
-
20
-
-
33750457295
-
A pi-calculus based semantics for WS-BPEL
-
Lucchi, R., Mazzara, M.: A pi-calculus based semantics for WS-BPEL. J. Log. Algebr. Program. 70(1), 96-118 (2007)
-
(2007)
J. Log. Algebr. Program
, vol.70
, Issue.1
, pp. 96-118
-
-
Lucchi, R.1
Mazzara, M.2
-
21
-
-
35048815139
-
Controlled declassification based on intransitive noninterference
-
Mantel, H., Sands, D.: Controlled Declassification Based on Intransitive Noninterference. In: Chin,W.N. (ed.) APLAS 2004. LNCS, vol. 3302, pp. 129-145. Springer, Heidelberg (2004) (Pubitemid 39750480)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3302
, pp. 129-145
-
-
Mantel, H.1
Sands, D.2
-
24
-
-
33744958417
-
WofBPEL: A tool for automated analysis of BPEL processes
-
DOI 10.1007/11596141-37, Service-Oriented Computing, ICSOC 2005 - Third International Conference, Proceedings
-
Ouyang, C., Verbeek, E., van der Aalst, W.M.P., Breutel, S., Dumas, M., ter Hofstede, A.H.M.: WofBPEL: A Tool for Automated Analysis of BPEL Processes. In: Benatallah, B., Casati, F., Traverso, P. (eds.) ICSOC 2005. LNCS, vol. 3826, pp. 484-489. Springer, Heidelberg (2005) (Pubitemid 43856207)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3826 LNCS
, pp. 484-489
-
-
Ouyang, C.1
Verbeek, E.2
Van Der, A.W.M.P.3
Breutel, S.4
Dumas, M.5
Ter, H.A.H.M.6
-
26
-
-
70350355123
-
Tracking Information Flow in Dynamic Tree Structures
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Russo, A., Sabelfeld, A., Chudnov, A.: Tracking Information Flow in Dynamic Tree Structures. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 86-103. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 86-103
-
-
Russo, A.1
Sabelfeld, A.2
Chudnov, A.3
-
28
-
-
77951106085
-
From Dynamic to Static and Back: Riding the Roller Coaster of Information-flow Control Research
-
Pnueli, A., Virbitskaite, I., Voronkov, A. (eds.) PSI 2009. Springer, Heidelberg
-
Sabelfeld, A., Russo, A.: From Dynamic to Static and Back: Riding the Roller Coaster of Information-flow Control Research. In: Pnueli, A., Virbitskaite, I., Voronkov, A. (eds.) PSI 2009. LNCS, vol. 5947, pp. 352-365. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5947
, pp. 352-365
-
-
Sabelfeld, A.1
Russo, A.2
-
29
-
-
84929023885
-
-
Springer, Heidelberg
-
Seidl, H., Wilhelm, R., Hack, S.: Compiler Design: Analysis and Transformation. Springer, Heidelberg (2011)
-
(2011)
Compiler Design: Analysis and Transformation
-
-
Seidl, H.1
Wilhelm, R.2
Hack, S.3
-
30
-
-
85008603199
-
Provably Correct Runtime Enforcement of Non-Interference Properties
-
Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. Springer, Heidelberg
-
Venkatakrishnan, V.N., Xu, W., DuVarney, D.C., Sekar, R.: Provably Correct Runtime Enforcement of Non-Interference Properties. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 332-351. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4307
, pp. 332-351
-
-
Venkatakrishnan, V.N.1
Xu, W.2
DuVarney, D.C.3
Sekar, R.4
-
31
-
-
0030370740
-
A sound type system for secure ow analysis
-
Volpano, D.M., Irvine, C.E., Smith, G.: A sound type system for secure ow analysis. Journal of Computer Security 4(2/3), 167-188 (1996)
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-188
-
-
Volpano, D.M.1
Irvine, C.E.2
Smith, G.3
-
32
-
-
33750538195
-
Semantic-Based Development of Service-Oriented Systems
-
Najm, E., Pradat-Peyre, J.-F., Donzeau-Gouge, V.V. (eds.) FORTE 2006. Springer, Heidelberg
-
Wirsing, M., Clark, A., Gilmore, S., Hölzl, M., Knapp, A., Koch, N., Schroeder, A.: Semantic-Based Development of Service-Oriented Systems. In: Najm, E., Pradat-Peyre, J.-F., Donzeau-Gouge, V.V. (eds.) FORTE 2006. LNCS, vol. 4229, pp. 24-45. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4229
, pp. 24-45
-
-
Wirsing, M.1
Clark, A.2
Gilmore, S.3
Hölzl, M.4
Knapp, A.5
Koch, N.6
Schroeder, A.7
-
33
-
-
70350635706
-
Verification of Business Process Entailment Constraints using SPIN
-
Massacci, F., Redwine Jr., S.T., Zannone, N. (eds.) ESSoS 2009. Springer, Heidelberg
-
Wolter, C., Miseldine, P., Meinel, C.: Verification of Business Process Entailment Constraints using SPIN. In: Massacci, F., Redwine Jr., S.T., Zannone, N. (eds.) ESSoS 2009. LNCS, vol. 5429, pp. 1-15. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5429
, pp. 1-15
-
-
Wolter, C.1
Miseldine, P.2
Meinel, C.3
|