-
1
-
-
33646080360
-
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
-
Springer
-
A. Askarov and A. Sabelfeld. Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study. In Proc. of 10th ESORICS, pages 197-221. Springer, 2005.
-
(2005)
Proc. of 10th ESORICS
, pp. 197-221
-
-
Askarov, A.1
Sabelfeld, A.2
-
2
-
-
37149048216
-
A Certified Lightweight Non-interference Java Bytecode Verifier
-
Springer
-
G. Barthe, D. Pichardie, and T. Rezk. A Certified Lightweight Non-interference Java Bytecode Verifier. In Proc. of 16th ESOP, pages 125-140. Springer, 2007.
-
(2007)
Proc. of 16th ESOP
, pp. 125-140
-
-
Barthe, G.1
Pichardie, D.2
Rezk, T.3
-
3
-
-
0017517624
-
Certification of Programs for Secure Information Flow
-
D. E. Denning and P. J. Denning. Certification of Programs for Secure Information Flow. Commun. of the ACM, 20(7):504-513, 1977.
-
(1977)
Commun. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
4
-
-
84867438637
-
Defending Users Against Smartphone Apps: Techniques and Future Directions
-
Springer
-
W. Enck. Defending Users Against Smartphone Apps: Techniques and Future Directions. In Proc. of 7th ICISS. Springer, 2011.
-
(2011)
Proc. of 7th ICISS
-
-
Enck, W.1
-
5
-
-
85076889619
-
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
-
USENIX
-
W. Enck et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proc. of 9th OSDI, pages 393-407. USENIX, 2010.
-
(2010)
Proc. of 9th OSDI
, pp. 393-407
-
-
Enck, W.1
-
6
-
-
24144440405
-
Information Flow Analysis for Java Bytecode
-
Springer
-
S. Genaim and F. Spoto. Information Flow Analysis for Java Bytecode. In Proc. of 6th VMCAI, pages 346-362. Springer, 2005.
-
(2005)
Proc. of 6th VMCAI
, pp. 346-362
-
-
Genaim, S.1
Spoto, F.2
-
7
-
-
84863559764
-
-
Google Inc.
-
Google Inc. The Android Developer's Guide. http://developer.android.com/ guide/, 2011.
-
(2011)
The Android Developer's Guide
-
-
-
9
-
-
13444275220
-
Edit Automata: Enforcement Mechanisms for Run-time Security Policies
-
J. Ligatti, L. Bauer, and D. Walker. Edit Automata: Enforcement Mechanisms for Run-time Security Policies. Int. J. of Inf. Sec., 4(1):2-16, 2005.
-
(2005)
Int. J. of Inf. Sec.
, vol.4
, Issue.1
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
11
-
-
33646201525
-
A Typed Assembly Language for Non-interference
-
Springer
-
R. Medel, A. B. Compagnoni, and E. Bonelli. A Typed Assembly Language for Non-interference. In Proc. of 9th ICTCS, pages 360-374. Springer, 2005.
-
(2005)
Proc. of 9th ICTCS
, pp. 360-374
-
-
Medel, R.1
Compagnoni, A.B.2
Bonelli, E.3
-
13
-
-
84881225236
-
Enforceable Security Policies
-
F. B. Schneider. Enforceable Security Policies. ACM Trans. on Inf. Sys. Sec., 3(1):30{50, 2000.
-
(2000)
ACM Trans. on Inf. Sys. Sec.
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
14
-
-
84863598208
-
-
The Android Open Source Project. Bytecode for the Dalvik VM. http://source.android.com/tech/ dalvik/dalvik-bytecode.html, 2007.
-
(2007)
Bytecode for the Dalvik VM
-
-
-
17
-
-
0001905093
-
A Sound Type System for Secure Flow Analysis
-
D. Volpano, G. Smith, and C. Irvine. A Sound Type System for Secure Flow Analysis. J. of Comp. Sec., 4(3):1-21, 1996.
-
(1996)
J. of Comp. Sec.
, vol.4
, Issue.3
, pp. 1-21
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|