-
2
-
-
57049111067
-
Termination-insensitive noninterference leaks more than just a bit
-
Springer-Verlag, October
-
A. Askarov, S. Hunt, A. Sabelfeld, and D. Sands. Termination-insensitive noninterference leaks more than just a bit. In Proc. European Symp. on Research in Computer Security, volume 5283 of LNCS, pages 333-348. Springer-Verlag, October 2008.
-
(2008)
Proc. European Symp. on Research in Computer Security, Volume 5283 of LNCS
, pp. 333-348
-
-
Askarov, A.1
Hunt, S.2
Sabelfeld, A.3
Sands, D.4
-
7
-
-
74049102285
-
Reactive noninterference
-
November
-
Aaron Bohannon, Benjamin C. Pierce, Vilhelm Sjöberg, Stephanie Weirich, and Steve Zdancewic. Reactive noninterference. In ACM Conference on Computer and Communications Security, pages 79-90, November 2009.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 79-90
-
-
Bohannon, A.1
Pierce, B.C.2
Sjöberg, V.3
Weirich, S.4
Zdancewic, S.5
-
8
-
-
19544375598
-
Enforcing security and safety models with an information flow analysis tool
-
R. Chapman and A. Hilton. Enforcing security and safety models with an information flow analysis tool. ACM SIGAda Ada Letters, 24(4):39-46, 2004.
-
(2004)
ACM SIGAda Ada Letters
, vol.24
, Issue.4
, pp. 39-46
-
-
Chapman, R.1
Hilton, A.2
-
10
-
-
0001760770
-
Information transmission in sequential programs
-
R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors Academic Press
-
E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
11
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
January
-
P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proc. ACM Symp. on Principles of Programming Languages, pages 238-252, January 1977.
-
(1977)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
13
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
16
-
-
84889691795
-
-
Facebook
-
Facebook. FBJS. http://wiki.developers.facebook.com/index.php/FBJS, 2009.
-
(2009)
FBJS
-
-
-
17
-
-
84974776068
-
A classification of security properties for process algebras
-
R. Focardi and R. Gorrieri. A classification of security properties for process algebras. J. Computer Security, 3(1):5-33, 1995.
-
(1995)
J. Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
18
-
-
24644477761
-
Bridging language-based and process calculi security
-
Foundations of Software Science and Computational Structures - 8th Int. Conference, FOSSACS 2005, held as part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Proc.
-
R. Focardi, S. Rossi, and A. Sabelfeld. Bridging language-based and process calculi security. In Proc. Foundations of Software Science and Computation Structure, volume 3441 of LNCS, pages 299-315. Springer-Verlag, April 2005. (Pubitemid 41273714)
-
(2005)
Lecture Notes in Computer Science
, vol.3441
, pp. 299-315
-
-
Focardi, R.1
Rossi, S.2
Sabelfeld, A.3
-
20
-
-
84947269249
-
Secure information flow as typed process behaviour
-
Springer-Verlag
-
K. Honda, V. Vasconcelos, and N. Yoshida. Secure information flow as typed process behaviour. In Proc. European Symp. on Programming, volume 1782 of LNCS, pages 180-199. Springer-Verlag, 2000.
-
(2000)
Proc. European Symp. on Programming, Volume 1782 of LNCS
, pp. 180-199
-
-
Honda, K.1
Vasconcelos, V.2
Yoshida, N.3
-
23
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
Thirteenth International World Wide Web Conference Proceedings, WWW2004
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing web application code by static analysis and runtime protection. In Proc. International Conference on World Wide Web, pages 40-52, May 2004. (Pubitemid 40752739)
-
(2004)
Thirteenth International World Wide Web Conference Proceedings, WWW2004
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.T.5
Kuo, S.-Y.6
-
26
-
-
49949102660
-
Automata-based confidentiality monitoring
-
Springer-Verlag
-
G. Le Guernic, Anindya Banerjee, Thomas Jensen, and David Schmidt. Automata-based confidentiality monitoring. In Proc. Asian Computing Science Conference (ASIAN'06), volume 4435 of LNCS. Springer-Verlag, 2006.
-
(2006)
Proc. Asian Computing Science Conference (ASIAN'06), Volume 4435 of LNCS
-
-
Le Guernic, G.1
Banerjee, A.2
Jensen, T.3
Schmidt, D.4
-
28
-
-
80051985460
-
Isolating javascript with filters, rewriting, and wrappers
-
LNCS
-
S. Maffeis, J.C. Mitchell, and A. Taly. Isolating javascript with filters, rewriting, and wrappers. In Proc. of ESORICS'09. LNCS, 2009.
-
(2009)
Proc. of ESORICS'09
-
-
Maffeis, S.1
Mitchell, J.C.2
Taly, A.3
-
29
-
-
70350525212
-
Language-based isolation of untrusted javascript
-
IEEE See also: Dep. of Computing, Imperial College London, Technical Report DTR09-3, 2009
-
S. Maffeis and A. Taly. Language-based isolation of untrusted Javascript. In Proc. of CSF'09, IEEE, 2009. See also: Dep. of Computing, Imperial College London, Technical Report DTR09-3, 2009.
-
(2009)
Proc. of CSF'09
-
-
Maffeis, S.1
Taly, A.2
-
31
-
-
0033701251
-
Possibilistic definitions of security - An assembly kit
-
July
-
H. Mantel. Possibilistic definitions of security - An assembly kit-. In Proc. IEEE Computer Security Foundations Workshop, pages 185-199, July 2000.
-
(2000)
Proc. IEEE Computer Security Foundations Workshop
, pp. 185-199
-
-
Mantel, H.1
-
32
-
-
84881123660
-
Information flow control and applications - Bridging a gap
-
FME 2001: Formal Methods for Increasing Software Productivity
-
H. Mantel. Information flow control and applications-Bridging a gap. In Proc. Formal Methods Europe, volume 2021 of LNCS, pages 153-172. Springer-Verlag, March 2001. (Pubitemid 36332798)
-
(2001)
Lecture Notes in Computer Science
, Issue.2021
, pp. 153-172
-
-
Mantel, H.1
-
33
-
-
0141528662
-
A unifying approach to the security of distributed and multi-threaded programs
-
September
-
H. Mantel and A. Sabelfeld. A unifying approach to the security of distributed and multi-threaded programs. J. Computer Security, 11(4):615-676, September 2003.
-
(2003)
J. Computer Security
, vol.11
, Issue.4
, pp. 615-676
-
-
Mantel, H.1
Sabelfeld, A.2
-
35
-
-
70349127409
-
-
M. Miller, M. Samuel, B. Laurie, I. Awad, and M. Stay. Caja: Safe active content in sanitized javascript, 2008.
-
(2008)
Caja: Safe Active Content in Sanitized Javascript
-
-
Miller, M.1
Samuel, M.2
Laurie, B.3
Awad, I.4
Stay, M.5
-
37
-
-
0005260169
-
-
Located July
-
A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nys-trom. Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001.
-
(2001)
Jif: Java Information Flow. Software Release
-
-
Myers, A.C.1
Zheng, L.2
Zdancewic, S.3
Chong, S.4
Nys-Trom, N.5
-
38
-
-
33947681312
-
Information-flow security for interactive programs
-
DOI 10.1109/CSFW.2006.16, 1648718, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006
-
K. O'Neill, M. Clarkson, and S. Chong. Information-flow security for interactive programs. In Proc. IEEE Computer Security Foundations Workshop, pages 190-201, July 2006. (Pubitemid 46499727)
-
(2006)
Proceedings of the Computer Security Foundations Workshop
, vol.2006
, pp. 190-201
-
-
O'Neill, K.R.1
Clarkson, M.R.2
Chong, S.3
-
39
-
-
84948737028
-
A simple view of type-secure information flow in the pi-calculus
-
June
-
F. Pottier. A simple view of type-secure information flow in the pi-calculus. In Proc. IEEE Computer Security Foundations Workshop, pages 320-330, June 2002.
-
(2002)
Proc. IEEE Computer Security Foundations Workshop
, pp. 320-330
-
-
Pottier, F.1
-
40
-
-
84889751936
-
Limiting information leakage in event-based communication: Extended version
-
Located
-
W. Rafnsson and A. Sabelfeld. Limiting information leakage in event-based communication: Extended version. Technical report, Chalmers University of Technology, 2011. Located at http://www.cse.chalmers.se/-rafnsson/2011plas.
-
(2011)
Technical Report, Chalmers University of Technology
-
-
Rafnsson, W.1
Sabelfeld, A.2
-
44
-
-
84949243805
-
Mathematical models of computer security-tutorial lectures
-
Foundations of Security Analysis and Design
-
P. Ryan. Mathematical models of computer security-tutorial lectures. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 1-62. Springer-Verlag, 2001. (Pubitemid 33364378)
-
(2001)
Lecture Notes in Computer Science
, Issue.2171
, pp. 1-62
-
-
Ryan, P.Y.A.1
-
46
-
-
84958755151
-
Static confidentiality enforcement for distributed programs
-
Springer-Verlag, September
-
A. Sabelfeld and H. Mantel. Static confidentiality enforcement for distributed programs. In Proc. Symp. on Static Analysis, volume 2477 of LNCS, pages 376-394. Springer-Verlag, September 2002.
-
(2002)
Proc. Symp. on Static Analysis, Volume 2477 of LNCS
, pp. 376-394
-
-
Sabelfeld, A.1
Mantel, H.2
-
49
-
-
35048880192
-
Dynamic dependency monitoring to secure information flow
-
DOI 10.1109/CSF.2007.20, 4271650, Proceedings - 20th IEEE Computer Security Foundations Symposium, CSFS20
-
P. Shroff, S. Smith, and M. Thober. Dynamic dependency monitoring to secure information flow. In Proc. IEEE Computer Security Foundations Symposium, pages 203-217, July 2007. (Pubitemid 47554215)
-
(2007)
Proceedings - IEEE Computer Security Foundations Symposium
, pp. 203-217
-
-
Shroff, P.1
Smith, S.F.2
Thober, M.3
-
50
-
-
33646091639
-
-
Software release. Located July
-
V. Simonet. The Flow Caml system. Software release. Located at http://cristal.inria.fr/-simonet/soft/flowcaml, July 2003.
-
(2003)
The Flow Caml System
-
-
Simonet, V.1
-
52
-
-
84887309913
-
Cross-site scripting prevention with dynamic data tainting and static analysis
-
February
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-site scripting prevention with dynamic data tainting and static analysis. In Proc. Network and Distributed System Security Symposium, February 2007.
-
(2007)
Proc. Network and Distributed System Security Symposium
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
54
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3):167-187, 1996.
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|