메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Limiting information leakage in event-based communication

Author keywords

Event model; Information flow; Reactive programming

Indexed keywords

EVENT MODEL; EVENT STRUCTURES; EVENT-BASED; FLOW-SENSITIVE ANALYSIS; INFORMATION FLOWS; INFORMATION LEAKAGE; JAVASCRIPT; REACTIVE LANGUAGES; REACTIVE PROGRAMMING; SECURITY FRAMEWORKS; SECURITY LEVEL; SENSITIVE INFORMATIONS; USER EXPERIENCE; WEB APPLICATION;

EID: 84860301003     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2166956.2166960     Document Type: Conference Paper
Times cited : (15)

References (54)
  • 8
    • 19544375598 scopus 로고    scopus 로고
    • Enforcing security and safety models with an information flow analysis tool
    • R. Chapman and A. Hilton. Enforcing security and safety models with an information flow analysis tool. ACM SIGAda Ada Letters, 24(4):39-46, 2004.
    • (2004) ACM SIGAda Ada Letters , vol.24 , Issue.4 , pp. 39-46
    • Chapman, R.1    Hilton, A.2
  • 10
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors Academic Press
    • E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 11
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • January
    • P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proc. ACM Symp. on Principles of Programming Languages, pages 238-252, January 1977.
    • (1977) Proc. ACM Symp. on Principles of Programming Languages , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 13
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 16
    • 84889691795 scopus 로고    scopus 로고
    • Facebook
    • Facebook. FBJS. http://wiki.developers.facebook.com/index.php/FBJS, 2009.
    • (2009) FBJS
  • 17
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • R. Focardi and R. Gorrieri. A classification of security properties for process algebras. J. Computer Security, 3(1):5-33, 1995.
    • (1995) J. Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 18
    • 24644477761 scopus 로고    scopus 로고
    • Bridging language-based and process calculi security
    • Foundations of Software Science and Computational Structures - 8th Int. Conference, FOSSACS 2005, held as part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Proc.
    • R. Focardi, S. Rossi, and A. Sabelfeld. Bridging language-based and process calculi security. In Proc. Foundations of Software Science and Computation Structure, volume 3441 of LNCS, pages 299-315. Springer-Verlag, April 2005. (Pubitemid 41273714)
    • (2005) Lecture Notes in Computer Science , vol.3441 , pp. 299-315
    • Focardi, R.1    Rossi, S.2    Sabelfeld, A.3
  • 28
    • 80051985460 scopus 로고    scopus 로고
    • Isolating javascript with filters, rewriting, and wrappers
    • LNCS
    • S. Maffeis, J.C. Mitchell, and A. Taly. Isolating javascript with filters, rewriting, and wrappers. In Proc. of ESORICS'09. LNCS, 2009.
    • (2009) Proc. of ESORICS'09
    • Maffeis, S.1    Mitchell, J.C.2    Taly, A.3
  • 29
    • 70350525212 scopus 로고    scopus 로고
    • Language-based isolation of untrusted javascript
    • IEEE See also: Dep. of Computing, Imperial College London, Technical Report DTR09-3, 2009
    • S. Maffeis and A. Taly. Language-based isolation of untrusted Javascript. In Proc. of CSF'09, IEEE, 2009. See also: Dep. of Computing, Imperial College London, Technical Report DTR09-3, 2009.
    • (2009) Proc. of CSF'09
    • Maffeis, S.1    Taly, A.2
  • 31
    • 0033701251 scopus 로고    scopus 로고
    • Possibilistic definitions of security - An assembly kit
    • July
    • H. Mantel. Possibilistic definitions of security - An assembly kit-. In Proc. IEEE Computer Security Foundations Workshop, pages 185-199, July 2000.
    • (2000) Proc. IEEE Computer Security Foundations Workshop , pp. 185-199
    • Mantel, H.1
  • 32
    • 84881123660 scopus 로고    scopus 로고
    • Information flow control and applications - Bridging a gap
    • FME 2001: Formal Methods for Increasing Software Productivity
    • H. Mantel. Information flow control and applications-Bridging a gap. In Proc. Formal Methods Europe, volume 2021 of LNCS, pages 153-172. Springer-Verlag, March 2001. (Pubitemid 36332798)
    • (2001) Lecture Notes in Computer Science , Issue.2021 , pp. 153-172
    • Mantel, H.1
  • 33
    • 0141528662 scopus 로고    scopus 로고
    • A unifying approach to the security of distributed and multi-threaded programs
    • September
    • H. Mantel and A. Sabelfeld. A unifying approach to the security of distributed and multi-threaded programs. J. Computer Security, 11(4):615-676, September 2003.
    • (2003) J. Computer Security , vol.11 , Issue.4 , pp. 615-676
    • Mantel, H.1    Sabelfeld, A.2
  • 38
    • 33947681312 scopus 로고    scopus 로고
    • Information-flow security for interactive programs
    • DOI 10.1109/CSFW.2006.16, 1648718, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006
    • K. O'Neill, M. Clarkson, and S. Chong. Information-flow security for interactive programs. In Proc. IEEE Computer Security Foundations Workshop, pages 190-201, July 2006. (Pubitemid 46499727)
    • (2006) Proceedings of the Computer Security Foundations Workshop , vol.2006 , pp. 190-201
    • O'Neill, K.R.1    Clarkson, M.R.2    Chong, S.3
  • 39
    • 84948737028 scopus 로고    scopus 로고
    • A simple view of type-secure information flow in the pi-calculus
    • June
    • F. Pottier. A simple view of type-secure information flow in the pi-calculus. In Proc. IEEE Computer Security Foundations Workshop, pages 320-330, June 2002.
    • (2002) Proc. IEEE Computer Security Foundations Workshop , pp. 320-330
    • Pottier, F.1
  • 40
    • 84889751936 scopus 로고    scopus 로고
    • Limiting information leakage in event-based communication: Extended version
    • Located
    • W. Rafnsson and A. Sabelfeld. Limiting information leakage in event-based communication: Extended version. Technical report, Chalmers University of Technology, 2011. Located at http://www.cse.chalmers.se/-rafnsson/2011plas.
    • (2011) Technical Report, Chalmers University of Technology
    • Rafnsson, W.1    Sabelfeld, A.2
  • 44
    • 84949243805 scopus 로고    scopus 로고
    • Mathematical models of computer security-tutorial lectures
    • Foundations of Security Analysis and Design
    • P. Ryan. Mathematical models of computer security-tutorial lectures. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 1-62. Springer-Verlag, 2001. (Pubitemid 33364378)
    • (2001) Lecture Notes in Computer Science , Issue.2171 , pp. 1-62
    • Ryan, P.Y.A.1
  • 46
    • 84958755151 scopus 로고    scopus 로고
    • Static confidentiality enforcement for distributed programs
    • Springer-Verlag, September
    • A. Sabelfeld and H. Mantel. Static confidentiality enforcement for distributed programs. In Proc. Symp. on Static Analysis, volume 2477 of LNCS, pages 376-394. Springer-Verlag, September 2002.
    • (2002) Proc. Symp. on Static Analysis, Volume 2477 of LNCS , pp. 376-394
    • Sabelfeld, A.1    Mantel, H.2
  • 49
    • 35048880192 scopus 로고    scopus 로고
    • Dynamic dependency monitoring to secure information flow
    • DOI 10.1109/CSF.2007.20, 4271650, Proceedings - 20th IEEE Computer Security Foundations Symposium, CSFS20
    • P. Shroff, S. Smith, and M. Thober. Dynamic dependency monitoring to secure information flow. In Proc. IEEE Computer Security Foundations Symposium, pages 203-217, July 2007. (Pubitemid 47554215)
    • (2007) Proceedings - IEEE Computer Security Foundations Symposium , pp. 203-217
    • Shroff, P.1    Smith, S.F.2    Thober, M.3
  • 50
    • 33646091639 scopus 로고    scopus 로고
    • Software release. Located July
    • V. Simonet. The Flow Caml system. Software release. Located at http://cristal.inria.fr/-simonet/soft/flowcaml, July 2003.
    • (2003) The Flow Caml System
    • Simonet, V.1
  • 54
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3):167-187, 1996.
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.