메뉴 건너뛰기




Volumn , Issue , 2014, Pages 37-48

FlowR: Aspect oriented programming for information flow control in ruby

Author keywords

Aspect Oriented Programming; Information Flow Control; Security

Indexed keywords

FLOW CONTROL; OBJECT ORIENTED PROGRAMMING; PLATFORM AS A SERVICE (PAAS); RUBY;

EID: 84900037333     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2577080.2577090     Document Type: Conference Paper
Times cited : (12)

References (59)
  • 4
  • 5
    • 77953149045 scopus 로고    scopus 로고
    • Evaluating re-identification risks with respect to the HIPAA privacy rule
    • K. Benitez and B. Malin. Evaluating re-identification risks with respect to the HIPAA privacy rule. Journal of the American Medical Informatics Association, 17(2):169-177, 2010.
    • (2010) Journal of the American Medical Informatics Association , vol.17 , Issue.2 , pp. 169-177
    • Benitez, K.1    Malin, B.2
  • 6
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • K. J. Biba. Integrity considerations for secure computer systems. Technical report, DTIC Document, 1977.
    • (1977) Technical Report, DTIC Document
    • Biba, K.J.1
  • 9
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning. A lattice model of secure information flow. Commun. ACM, 19(5):236-243, May 1976.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 10
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Commun. ACM, 20(7):504-513, July 1977.
    • (1977) Commun. ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 20
    • 80051974927 scopus 로고    scopus 로고
    • Timing- and termination-sensitive secure information flow: Exploring a new aproach
    • Berkeley, CA IEEE
    • V. Kashyap, B. Wiedermann, and B. Hardekopf. Timing- and termination-sensitive secure information flow: exploring a new aproach. In Symposium on Security and Privacy, Berkeley, CA, 2011. IEEE.
    • (2011) Symposium on Security and Privacy
    • Kashyap, V.1    Wiedermann, B.2    Hardekopf, B.3
  • 21
    • 42549128483 scopus 로고    scopus 로고
    • A case study implementing features using AspectJ
    • SPLC 2007. 11th International
    • C. Kastner, S. Apel, and D. Batory. A case study implementing features using AspectJ. In Software Product Line Conference, 2007. SPLC 2007. 11th International, pages 223-232, 2007.
    • (2007) Software Product Line Conference, 2007 , pp. 223-232
    • Kastner, C.1    Apel, S.2    Batory, D.3
  • 25
    • 39049160206 scopus 로고    scopus 로고
    • A general dynamic information flow tracking framework for security applications
    • ACSAC '06. 22nd Annual 2006
    • L. C. Lam and Tcker Chiueh. A general dynamic information flow tracking framework for security applications. In Computer Security Applications Conference, 2006. ACSAC '06. 22nd Annual, pages 463-472, 2006.
    • (2006) Computer Security Applications Conference , pp. 463-472
    • Lam, L.C.1    Chiueh, T.2
  • 26
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Oct.
    • B. W. Lampson. A note on the confinement problem. Commun. ACM, 16(10):613-615, Oct. 1973.
    • (1973) Commun. ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 27
    • 84945721946 scopus 로고
    • A comment on the confinement problem
    • Nov.
    • S. B. Lipner. A comment on the confinement problem. SIGOPS Oper. Syst. Rev., 9(5):192-196, Nov. 1975.
    • (1975) SIGOPS Oper. Syst. Rev. , vol.9 , Issue.5 , pp. 192-196
    • Lipner, S.B.1
  • 28
    • 0033682245 scopus 로고    scopus 로고
    • A study on exception detection and handling using aspect-oriented programming
    • Proceedings of the 2000 International Conference on
    • M. Lippert and C. Lopes. A study on exception detection and handling using Aspect-Oriented Programming. In Software Engineering, 2000. Proceedings of the 2000 International Conference on, pages 418-427, 2000.
    • (2000) Software Engineering, 2000 , pp. 418-427
    • Lippert, M.1    Lopes, C.2
  • 32
    • 49849090084 scopus 로고    scopus 로고
    • An aspect-oriented approach for the systematic security hardening of code
    • A. Mourad, M.-A. Laverdière, and M. Debbabi. An aspect-oriented approach for the systematic security hardening of code. Computers & Security, 27(3):101-114, 2008.
    • (2008) Computers & Security , vol.27 , Issue.3 , pp. 101-114
    • Mourad, A.1    Laverdière, M.-A.2    Debbabi, M.3
  • 35
    • 84937933114 scopus 로고    scopus 로고
    • Information flow control for a medical web portal
    • IADIS, March
    • T. Pasquier, B. Shand, and J. Bacon. Information Flow Control for a Medical Web Portal. In e-Society 2013. IADIS, March 2013.
    • (2013) E-Society 2013
    • Pasquier, T.1    Shand, B.2    Bacon, J.3
  • 37
    • 83255183340 scopus 로고    scopus 로고
    • AspectJ for multilevel security
    • March
    • R. Ramachandran, D. J. Pearce, and I. Welch. AspectJ for multilevel security. ACP4IS '06, 20:13-17, March 2006.
    • (2006) ACP4IS '06 , vol.20 , pp. 13-17
    • Ramachandran, R.1    Pearce, D.J.2    Welch, I.3
  • 39
    • 63149101516 scopus 로고    scopus 로고
    • A library for lightweight information-flow security in haskell
    • Sept.
    • A. Russo, K. Claessen, and J. Hughes. A library for lightweight information-flow security in Haskell. SIGPLAN Notices, 44(2):13-24, Sept. 2008.
    • (2008) SIGPLAN Notices , vol.44 , Issue.2 , pp. 13-24
    • Russo, A.1    Claessen, K.2    Hughes, J.3
  • 41
  • 42
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proc. IEEE, 63(9):1278-1308, 1975.
    • (1975) Proc. IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.D.2
  • 45
    • 33750420156 scopus 로고    scopus 로고
    • The paradoxical success of aspect-oriented programming
    • Oct.
    • F. Steimann. The paradoxical success of aspect-oriented programming. SIGPLAN Not., 41(10):481-497, Oct. 2006.
    • (2006) SIGPLAN Not. , vol.41 , Issue.10 , pp. 481-497
    • Steimann, F.1
  • 46
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • Oct.
    • G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. SIGOPS Oper. Syst. Rev., 38(5):85-96, Oct. 2004.
    • (2004) SIGOPS Oper. Syst. Rev. , vol.38 , Issue.5 , pp. 85-96
    • Suh, G.E.1    Lee, J.W.2    Zhang, D.3    Devadas, S.4
  • 50
    • 85008054329 scopus 로고    scopus 로고
    • Can aspect-oriented programming lead to more reliable software?
    • J. Viega and J. Vuas. Can Aspect-Oriented Programming lead to more reliable software? Software, IEEE, 17(6):19-21, 2000.
    • (2000) Software, IEEE , vol.17 , Issue.6 , pp. 19-21
    • Viega, J.1    Vuas, J.2
  • 51
    • 0346609657 scopus 로고    scopus 로고
    • Applying aspect-oriented programming to security
    • J. Viega, J. Bloch, and P. Chandra. Applying Aspect-Oriented Programming to security. Cutter IT Journal, 14(2):31-39, 2001.
    • (2001) Cutter IT Journal , vol.14 , Issue.2 , pp. 31-39
    • Viega, J.1    Bloch, J.2    Chandra, P.3
  • 53
    • 0030673701 scopus 로고    scopus 로고
    • Eliminating covert flows with minimum typings
    • Proceedings., 10th jun 1997
    • D. Volpano and G. Smith. Eliminating covert flows with minimum typings. In Computer Security Foundations Workshop, 1997. Proceedings., 10th, pages 156-168, jun 1997.
    • (1997) Computer Security Foundations Workshop , pp. 156-168
    • Volpano, D.1    Smith, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.