-
3
-
-
57049111067
-
Termination-insensitive noninterference leaks more than just a bit
-
Springer-Verlag, October
-
A. Askarov, S. Hunt, A. Sabelfeld, and D. Sands. Termination-insensitive noninterference leaks more than just a bit. In Proc. European Symp. on Research in Computer Security, volume 5283 of LNCS, pages 333-348. Springer-Verlag, October 2008.
-
(2008)
Proc. European Symp. on Research in Computer Security, Volume 5283 of LNCS
, pp. 333-348
-
-
Askarov, A.1
Hunt, S.2
Sabelfeld, A.3
Sands, D.4
-
6
-
-
0037014243
-
Non-interference for concurrent programs and thread systems
-
June
-
G. Boudol and I. Castellani. Non-interference for concurrent programs and thread systems. Theoretical Computer Science, 281(1):109-130, June 2002.
-
(2002)
Theoretical Computer Science
, vol.281
, Issue.1
, pp. 109-130
-
-
Boudol, G.1
Castellani, I.2
-
7
-
-
74049102285
-
Reactive noninterference
-
November
-
Aaron Bohannon, Benjamin C. Pierce, Vilhelm Sjöberg, Stephanie Weirich, and Steve Zdancewic. Reactive noninterference. In ACM Conference on Computer and Communications Security, pages 79-90, November 2009.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 79-90
-
-
Bohannon, A.1
Pierce, B.C.2
Sjöberg, V.3
Weirich, S.4
Zdancewic, S.5
-
8
-
-
19544375598
-
Enforcing security and safety models with an information flow analysis tool
-
R. Chapman and A. Hilton. Enforcing security and safety models with an information flow analysis tool. ACM SIGAda Ada Letters, 24(4):39-46, 2004.
-
(2004)
ACM SIGAda Ada Letters
, vol.24
, Issue.4
, pp. 39-46
-
-
Chapman, R.1
Hilton, A.2
-
10
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
12
-
-
84974776068
-
A classification of security properties for process algebras
-
R. Focardi and R. Gorrieri. A classification of security properties for process algebras. J. Computer Security, 3(1):5-33, 1995.
-
(1995)
J. Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
13
-
-
24644477761
-
Bridging language-based and process calculi security
-
Springer-Verlag, April
-
R. Focardi, S. Rossi, and A. Sabelfeld. Bridging language-based and process calculi security. In Proc. Foundations of Software Science and Computation Structure, volume 3441 of LNCS, pages 299-315. Springer-Verlag, April 2005.
-
(2005)
Proc. Foundations of Software Science and Computation Structure, Volume 3441 of LNCS
, pp. 299-315
-
-
Focardi, R.1
Rossi, S.2
Sabelfeld, A.3
-
14
-
-
84947269249
-
Secure information flow as typed process behaviour
-
Springer-Verlag
-
K. Honda, V. Vasconcelos, and N. Yoshida. Secure information flow as typed process behaviour. In Proc. European Symp. on Programming, volume 1782 of LNCS, pages 180-199. Springer-Verlag, 2000.
-
(2000)
Proc. European Symp. on Programming, Volume 1782 of LNCS
, pp. 180-199
-
-
Honda, K.1
Vasconcelos, V.2
Yoshida, N.3
-
18
-
-
0033701251
-
Possibilistic definitions of security - An assembly kit
-
July
-
H. Mantel. Possibilistic definitions of security - An assembly kit -. In Proc. IEEE Computer Security Foundations Workshop, pages 185-199, July 2000.
-
(2000)
Proc. IEEE Computer Security Foundations Workshop
, pp. 185-199
-
-
Mantel, H.1
-
19
-
-
84881123660
-
Information flow control and applications- bridging a gap
-
Springer-Verlag, March
-
H. Mantel. Information flow control and applications- Bridging a gap. In Proc. Formal Methods Europe, volume 2021 of LNCS, pages 153-172. Springer-Verlag, March 2001.
-
(2001)
Proc. Formal Methods Europe, Volume 2021 of LNCS
, pp. 153-172
-
-
Mantel, H.1
-
20
-
-
0023231848
-
Specifications for multi-level security and hook-up property
-
April
-
D. McCullough. Specifications for multi-level security and hook-up property. In Proc. IEEE Symp. on Security and Privacy, pages 161-166, April 1987.
-
(1987)
Proc. IEEE Symp. on Security and Privacy
, pp. 161-166
-
-
McCullough, D.1
-
21
-
-
0141528662
-
A unifying approach to the security of distributed and multi-threaded programs
-
September
-
H. Mantel and A. Sabelfeld. A unifying approach to the security of distributed and multi-threaded programs. J. Computer Security, 11(4):615-676, September 2003.
-
(2003)
J. Computer Security
, vol.11
, Issue.4
, pp. 615-676
-
-
Mantel, H.1
Sabelfeld, A.2
-
23
-
-
0005260169
-
-
Software release. Located at July
-
A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001.
-
(2001)
Jif: Java Information Flow
-
-
Myers, A.C.1
Zheng, L.2
Zdancewic, S.3
Chong, S.4
Nystrom, N.5
-
25
-
-
84948737028
-
A simple view of type-secure information flow in the pi-calculus
-
June
-
F. Pottier. A simple view of type-secure information flow in the pi-calculus. In Proc. IEEE Computer Security Foundations Workshop, pages 320-330, June 2002.
-
(2002)
Proc. IEEE Computer Security Foundations Workshop
, pp. 320-330
-
-
Pottier, F.1
-
28
-
-
0012886288
-
Mathematical models of computer security-tutorial lectures
-
R. Focardi and R. Gorrieri, editors Springer-Verlag
-
P. Ryan. Mathematical models of computer security-tutorial lectures. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 1-62. Springer-Verlag, 2001.
-
(2001)
Foundations of Security Analysis and Design, Volume 2171 of LNCS
, pp. 1-62
-
-
Ryan, P.1
-
29
-
-
33646091639
-
-
Software release. Located July
-
V. Simonet. The Flow Caml system. Software release. Located at http://cristal.inria.fr/~simonet/soft/flowcaml, July 2003.
-
(2003)
The Flow Caml System
-
-
Simonet, V.1
-
30
-
-
84958755151
-
Static confidentiality enforcement for distributed programs
-
Springer-Verlag, September
-
A. Sabelfeld and H. Mantel. Static confidentiality enforcement for distributed programs. In Proc. Symp. on Static Analysis, volume 2477 of LNCS, pages 376-394. Springer-Verlag, September 2002.
-
(2002)
Proc. Symp. on Static Analysis, Volume 2477 of LNCS
, pp. 376-394
-
-
Sabelfeld, A.1
Mantel, H.2
-
32
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3):167-187, 1996.
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|