메뉴 건너뛰기




Volumn , Issue , 2012, Pages 3-18

Information-flow security for a core of JavaScript

Author keywords

[No Author keywords available]

Indexed keywords

CODE EVALUATION; DOCUMENT OBJECT MODEL; DOCUMENT TREES; DYNAMIC LANGUAGES; DYNAMIC TYPE SYSTEMS; HIGHER-ORDER FUNCTIONS; INFORMATION FLOWS; JAVASCRIPT; LANGUAGE CONSTRUCTS;

EID: 84866904012     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2012.19     Document Type: Conference Paper
Times cited : (130)

References (45)
  • 5
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based access control and secure information flow
    • Mar.
    • A. Banerjee and D. A. Naumann. Stack-based access control and secure information flow. Journal of Functional Programming, 15(2):131-177, Mar. 2005.
    • (2005) Journal of Functional Programming , vol.15 , Issue.2 , pp. 131-177
    • Banerjee, A.1    Naumann, D.A.2
  • 9
    • 84866936613 scopus 로고    scopus 로고
    • Featherweight firefox: Formalizing the core of a web browser
    • June
    • A. Bohannon and B. C. Pierce. Featherweight Firefox: Formalizing the core of a web browser. In Proc. USENIX Security Symposium, June 2010.
    • (2010) Proc. USENIX Security Symposium
    • Bohannon, A.1    Pierce, B.C.2
  • 11
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors Academic Press
    • E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
    • (1978) Foundations of Secure Computation , pp. 297-335
    • Cohen, E.S.1
  • 12
    • 84866936611 scopus 로고    scopus 로고
    • Coq. http://coq.inria.fr.
  • 14
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning. A lattice model of secure information flow. Comm. of the ACM, 19(5):236-243, May 1976.
    • (1976) Comm. of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 15
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 20
    • 84866917687 scopus 로고    scopus 로고
    • Facebook
    • Facebook. FBJS. http://wiki.developers.facebook.com/index. php/FBJS, 2009.
    • (2009) FBJS
  • 21
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • May
    • J. S. Fenton. Memoryless subsystems. Computing J., 17(2):143-147, May 1974.
    • (1974) Computing J. , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 23
    • 84890883068 scopus 로고    scopus 로고
    • Gatekeeper: Mostly static enforcement of security and reliability policies for javascript code
    • SSYM'09, Berkeley, CA, USA USENIX Association
    • S. Guarnieri and B. Livshits. Gatekeeper: mostly static enforcement of security and reliability policies for javascript code. In Proceedings of the 18th conference on USENIX security symposium, SSYM'09, Berkeley, CA, USA, 2009. USENIX Association.
    • (2009) Proceedings of the 18th Conference on USENIX Security Symposium
    • Guarnieri, S.1    Livshits, B.2
  • 33
    • 0348017041 scopus 로고    scopus 로고
    • Information flow inference for ML
    • Jan.
    • F. Pottier and V. Simonet. Information flow inference for ML. ACM TOPLAS, 25(1):117-158, Jan. 2003.
    • (2003) ACM TOPLAS , vol.25 , Issue.1 , pp. 117-158
    • Pottier, F.1    Simonet, V.2
  • 44
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3):167-187, 1996.
    • (1996) J. Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.