-
4
-
-
67650663465
-
Secure information flow as a safety property
-
Springer, Heidelberg, In: Degano, P., Guttman, J., Martinelli, F. (eds.)
-
Boudol, G.: Secure information flow as a safety property. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 20-34. Springer, Heidelberg (2009)
-
(2009)
FAST 2008. LNCS
, vol.5491
, pp. 20-34
-
-
Boudol, G.1
-
6
-
-
0001760770
-
Information transmission in sequential programs
-
in, DeMillo R.A., Dobkin, D.P., Jones, A.K., Lipton, R.J. (eds.), Academic Press, London
-
Cohen, E.S.: Information transmission in sequential programs. In: DeMillo, R.A., Dobkin, D.P., Jones, A.K., Lipton, R.J. (eds.) Foundations of Secure Computation, pp. 297-335. Academic Press, London (1978)
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
8
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM 20(7), 504-513 (1977)
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
10
-
-
24944483574
-
-
PhD thesis, Cornell University, Ithaca, NY, USA
-
Erlingsson, U.: The inlined reference monitor approach to security policy enforcement. PhD thesis, Cornell University, Ithaca, NY, USA (2004)
-
(2004)
The inlined reference monitor approach to security policy enforcement
-
-
Erlingsson, U.1
-
11
-
-
84885074261
-
-
Facebook
-
Facebook. FBJS (2009), http://wiki.developers.facebook.com/index.php/FBJS
-
(2009)
FBJS
-
-
-
12
-
-
0016382977
-
Memoryless subsystems
-
Fenton, J.S.: Memoryless subsystems. Computing J 17(2), 143-147 (1974)
-
(1974)
Computing J
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
14
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
Hamlen, K.W., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM TOPLAS 28(1), 175-205 (2006)
-
(2006)
ACM TOPLAS
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.W.1
Morrisett, G.2
Schneider, F.B.3
-
15
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
in, May 2004
-
Huang, Y.-W., Yu, F., Hang, C., Tsai, C.-H., Lee, D.-T., Kuo, S.-Y.: Securing web application code by static analysis and runtime protection. In: Proc. International Conference on World Wide Web, May 2004, pp. 40-52 (2004)
-
(2004)
Proc. International Conference on World Wide Web
, pp. 40-52
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
16
-
-
84949229854
-
Language-based security
-
Springer, Heidelberg, In: Kutyłowski, M., Wierzbicki, T., Pacholski, L. (eds.)
-
Kozen, D.: Language-based security. In: Kutyłowski, M., Wierzbicki, T., Pacholski, L. (eds.) MFCS 1999. LNCS, vol. 1672, pp. 284-298. Springer, Heidelberg (1999)
-
(1999)
MFCS 1999. LNCS
, vol.1672
, pp. 284-298
-
-
Kozen, D.1
-
17
-
-
35048820041
-
Automaton-based confidentiality monitoring of concurrent programs
-
in, July 2007
-
Le Guernic, G.: Automaton-based confidentiality monitoring of concurrent programs. In: Proc. IEEE Computer Security Foundations Symposium, July 2007, pp. 218-232 (2007)
-
(2007)
Proc. IEEE Computer Security Foundations Symposium
, pp. 218-232
-
-
Le Guernic, G.1
-
18
-
-
49949102660
-
Automata-based confidentiality monitoring
-
In: Okada, M., Satoh, I. (eds.), Springer, Heidelberg
-
Le Guernic, G., Banerjee, A., Jensen, T., Schmidt, D.: Automata-based confidentiality monitoring. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435. Springer, Heidelberg (2008)
-
(2008)
ASIAN 2006. LNCS
, vol.4435
-
-
Le Guernic, G.1
Banerjee, A.2
Jensen, T.3
Schmidt, D.4
-
19
-
-
0042733585
-
Java bytecode verification: Algorithms and formalizations
-
Leroy, X.: Java bytecode verification: algorithms and formalizations. J. Automated Reasoning 30(3-4), 235-269 (2003)
-
(2003)
J. Automated Reasoning
, vol.30
, Issue.3-4
, pp. 235-269
-
-
Leroy, X.1
-
20
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
Ligatti, J., Bauer, L., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security 4, 2-16 (2005)
-
(2005)
International Journal of Information Security
, vol.4
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
21
-
-
70350371746
-
Isolating java Script with filters, rewriting, and wrappers
-
Springer, Heidelberg, In: Backes, M., Ning, P. (eds.)
-
Maffeis, S., Mitchell, J., Taly, A.: Isolating java Script with filters, rewriting, and wrappers. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 505-522. Springer, Heidelberg (2009)
-
(2009)
ESORICS 2009. LNCS
, vol.5789
, pp. 505-522
-
-
Maffeis, S.1
Mitchell, J.2
Taly, A.3
-
22
-
-
70350525212
-
Language-based isolation of untrusted Javascript
-
in, Los Alamitos (2009), See also: Dep. of Computing, Imperial College London, Technical Report DTR09-3
-
Maffeis, S., Taly, A.: Language-based isolation of untrusted Javascript. In: Proc. of CSF'09. IEEE, Los Alamitos (2009), See also: Dep. of Computing, Imperial College London, Technical Report DTR09-3 (2009)
-
(2009)
Proc. of CSF'09. IEEE
-
-
Maffeis, S.1
Taly, A.2
-
23
-
-
77954492783
-
A lattice-based approach to mashup security
-
April
-
Magazinius, J., Askarov, A., Sabelfeld, A.: A lattice-based approach to mashup security. In: Proc. ACM Symposium on Information, Computer and Communications Security (ASIACCS) (April 2010)
-
(2010)
Proc. ACM Symposium on Information, Computer and Communications Security (ASIACCS)
-
-
Magazinius, J.1
Askarov, A.2
Sabelfeld, A.3
-
26
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
in, May 1994
-
McLean, J.: A general theory of composition for trace sets closed under selective interleaving functions. In: Proc. IEEE Symp. on Security and Privacy, May 1994, pp. 79-93 (1994)
-
(1994)
Proc. IEEE Symp. on Security and Privacy
, pp. 79-93
-
-
McLean, J.1
-
27
-
-
70349127409
-
-
Miller, M., Samuel, M., Laurie, B., Awad, I., Stay, M.: Caja: Safe active content in sanitized javascript (2008)
-
(2008)
Caja: Safe active content in sanitized javascript
-
-
Miller, M.1
Samuel, M.2
Laurie, B.3
Awad, I.4
Stay, M.5
-
28
-
-
0005260169
-
-
Software release July
-
Myers, A.C., Zheng, L., Zdancewic, S., Chong, S., Nystrom, N.: Jif: Java information flow. Software release (July 2001), http://www.cs.cornell.edu/jif
-
(2001)
Jif: Java information flow
-
-
Myers, A.C.1
Zheng, L.2
Zdancewic, S.3
Chong, S.4
Nystrom, N.5
-
29
-
-
34848907433
-
Browsershield: Vulnerabilitydriven filtering of dynamic html
-
Reis, C., Dunagan, J., Wang, H.J., Dubrovsky, O., Esmeir, S.: Browsershield: Vulnerabilitydriven filtering of dynamic html. ACM Trans. Web 1(3), 11 (2007)
-
(2007)
ACM Trans. Web
, vol.1
, Issue.3
, pp. 11
-
-
Reis, C.1
Dunagan, J.2
Wang, H.J.3
Dubrovsky, O.4
Esmeir, S.5
-
32
-
-
70350355123
-
Tracking information flow in dynamic tree structures
-
Springer, Heidelberg, In: Backes, M., Ning, P. (eds.)
-
Russo, A., Sabelfeld, A., Chudnov, A.: Tracking information flow in dynamic tree structures. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 86-103. Springer, Heidelberg (2009)
-
(2009)
ESORICS 2009. LNCS
, vol.5789
, pp. 86-103
-
-
Russo, A.1
Sabelfeld, A.2
Chudnov, A.3
-
36
-
-
0012889295
-
A language-based approach to security
-
Springer, Heidelberg, In: Wilhelm, R. (ed.)
-
Schneider, F.B., Morrisett, G., Harper, R.: A language-based approach to security. In: Wilhelm, R. (ed.) Informatics: 10 Years Back, 10 Years Ahead. LNCS, vol. 2000, pp. 86-101. Springer, Heidelberg (2001)
-
(2001)
Informatics: 10 Years Back, 10 Years Ahead. LNCS
, vol.2000
, pp. 86-101
-
-
Schneider, F.B.1
Morrisett, G.2
Harper, R.3
-
37
-
-
35048880192
-
Dynamic dependency monitoring to secure information flow
-
in, July 2007
-
Shroff, P., Smith, S., Thober, M.: Dynamic dependency monitoring to secure information flow. In: Proc. IEEE Computer Security Foundations Symposium, July 2007, pp. 203-217 (2007)
-
(2007)
Proc. IEEE Computer Security Foundations Symposium
, pp. 203-217
-
-
Shroff, P.1
Smith, S.2
Thober, M.3
-
38
-
-
33646091639
-
-
Software release July
-
Simonet, V.: The Flow Caml system. Software release (July 2003), http://cristal.inria.fr/simonet/soft/flowcaml
-
(2003)
The Flow Caml system
-
-
Simonet, V.1
-
40
-
-
33646037706
-
Secure information flow as a safety problem
-
Springer, Heidelberg, In: Hankin, C., Siveroni, I. (eds.)
-
Terauchi, T., Aiken, A.: Secure information flow as a safety problem. In: Hankin, C., Siveroni, I. (eds.) SAS 2005. LNCS, vol. 3672, pp. 352-367. Springer, Heidelberg (2005)
-
(2005)
SAS 2005. LNCS
, vol.3672
, pp. 352-367
-
-
Terauchi, T.1
Aiken, A.2
-
41
-
-
85008603199
-
Provably correct runtime enforcement of non-interference properties
-
Springer, Heidelberg, In: Ning, P., Qing, S., Li, N. (eds.)
-
Venkatakrishnan, V.N., Xu, W., DuVarney, D.C., Sekar, R.: Provably correct runtime enforcement of non-interference properties. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 332-351. Springer, Heidelberg (2006)
-
(2006)
ICICS 2006. LNCS
, vol.4307
, pp. 332-351
-
-
Venkatakrishnan, V.N.1
Xu, W.2
DuVarney, D.C.3
Sekar, R.4
-
42
-
-
84887309913
-
Cross-site scripting prevention with dynamic data tainting and static analysis
-
February
-
Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Cross-site scripting prevention with dynamic data tainting and static analysis. In: Proc. Network and Distributed System Security Symposium (February 2007)
-
(2007)
Proc. Network and Distributed System Security Symposium
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
43
-
-
84957709924
-
Safety versus secrecy
-
Springer, Heidelberg, In: Cortesi, A., Filé, G. (eds.)
-
Volpano, D.: Safety versus secrecy. In: Cortesi, A., Filé, G. (eds.) SAS 1999. LNCS, vol. 1694, pp. 303-311. Springer, Heidelberg (1999)
-
(1999)
SAS 1999. LNCS
, vol.1694
, pp. 303-311
-
-
Volpano, D.1
-
44
-
-
0030370740
-
A sound type system for secure flow analysis
-
Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. J. Computer Security 4(3), 167-187 (1996)
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
45
-
-
0039334688
-
The security architecture formerly known as stack inspection: A security mechanism for language-based systems
-
Wallach, D.S., Appel, A.W., Felten, E.W.: The security architecture formerly known as stack inspection: A security mechanism for language-based systems. ACM Transactions on Software Engineering and Methodology 9(4), 341-378 (2000)
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 341-378
-
-
Wallach, D.S.1
Appel, A.W.2
Felten, E.W.3
|