-
5
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
Dorothy E. Denning and Peter J. Denning. Certification of programs for secure information flow. Comm, of the ACM, 20(7):504-513, July 1977.
-
(1977)
Comm, of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
7
-
-
0029706405
-
A security model of dynamic labeling providing a tiered approach to verification
-
In, Oakland, CA, IEEE Computer Society Press
-
Simon Foley, Li Gong, and Xiaolei Qian. A security model of dynamic labeling providing a tiered approach to verification. In IEEE Symposium on Security and Privacy, pages 142-154, Oakland, CA, 1996. IEEE Computer Society Press.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 142-154
-
-
Foley, S.1
Gong, L.2
Qian, X.3
-
9
-
-
0031701347
-
The SLam calculus: Programming with secrecy and integrity
-
In, San Diego, California, January
-
Nevin Heintze and Jon G. Riecke. The SLam calculus: Programming with secrecy and integrity. In Proc. 25th ACM Symp. on Principles of Programming Languages (POPL), pages 365-377, San Diego, California, January 1998.
-
(1998)
Proc. 25th ACM Symp. on Principles of Programming Languages (POPL)
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.G.2
-
10
-
-
0023847479
-
The algebra of security
-
In, Oakland, California
-
John McLean. The algebra of security. In IEEE Symposium on Security and Privacy, pages 2-7, Oakland, California, 1988.
-
(1988)
IEEE Symposium on Security and Privacy
, pp. 2-7
-
-
McLean, J.1
-
15
-
-
0005260169
-
-
Software release. Located at, July 2001-2003
-
Andrew C. Myers, Lantian Zheng, Steve Zdancewic, Stephen Chong, and Nathaniel Nystrom. Jif: Java information flow. Software release. Located at http://www.es.Cornell, edu/jif, July 2001-2003.
-
Jif: Java information flow
-
-
Myers, A.C.1
Zheng, L.2
Zdancewic, S.3
Chong, S.4
Nystrom, N.5
-
16
-
-
84955596529
-
Trust in the λ-calculus
-
In, in Lecture Notes in Computer Science, Springer, September
-
Jens Palsberg and Peter Ørbæk. Trust in the λ-calculus. In Proc. 2nd International Symposium on Static Analysis, number 983 in Lecture Notes in Computer Science, pages 314-329. Springer, September 1995.
-
(1995)
Proc. 2nd International Symposium on Static Analysis
, vol.983
, pp. 314-329
-
-
Palsberg, J.1
Ørbæk, P.2
-
18
-
-
84958755151
-
Static confidentiality enforcement for distributed programs
-
In, Madrid, Spain, September, Springer-Verlag
-
Andrei Sabelfeld and Heiko Mantel. Static confidentiality enforcement for distributed programs. In Proceedings of the 9th International Static Analysis Symposium, volume 2477 of LNCS, Madrid, Spain, September 2002. Springer-Verlag.
-
(2002)
Proceedings of the 9th International Static Analysis Symposium, volume 2477 of LNCS
-
-
Sabelfeld, A.1
Mantel, H.2
-
21
-
-
0024887832
-
Deducibility security with dynamic level assignments
-
In, Franconia, NH, June
-
Ian Sutherland, Stanley Perlo, and Rammohan Varadarajan. Deducibility security with dynamic level assignments. In Proc. 2nd IEEE Computer Security Foundations Workshop, Franconia, NH, June 1989.
-
(1989)
Proc. 2nd IEEE Computer Security Foundations Workshop
-
-
Sutherland, I.1
Perlo, S.2
Varadarajan, R.3
-
22
-
-
3543147869
-
Run-time principals in information-flow type systems
-
In, Oakland, CA, May
-
Stephen Tse and Steve Zdancewic. Run-time principals in information-flow type systems. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2004.
-
(2004)
IEEE Symposium on Security and Privacy
-
-
Tse, S.1
Zdancewic, S.2
-
23
-
-
0030370740
-
A sound type system for secure flow analysis
-
Dennis Volpano, Geoffrey Smith, and Cynthia Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3): 167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
24
-
-
4544284713
-
Security controls in the ADEPT-50 time-sharing system
-
In
-
Clark Weissman. Security controls in the ADEPT-50 time-sharing system. In AFIPS Conference Proceedings, volume 35, pages 119-133, 1969.
-
(1969)
AFIPS Conference Proceedings
, vol.35
, pp. 119-133
-
-
Weissman, C.1
-
25
-
-
0023209778
-
Exploiting the dual nature of sensitivity labels
-
In, Oakland, California
-
John P. L. Woodward. Exploiting the dual nature of sensitivity labels. In IEEE Symposium on Security and Privacy, pages 23-30, Oakland, California, 1987.
-
(1987)
IEEE Symposium on Security and Privacy
, pp. 23-30
-
-
Woodward, J.P.L.1
-
26
-
-
0032670051
-
Dependent types in practical programming
-
In, San Antonio, TX, January
-
Hongwei Xi and Frank Pfenning. Dependent types in practical programming. In Proc. 26th ACM Symp. on Principles of Programming Languages (POPL), pages 214-227, San Antonio, TX, January 1999.
-
(1999)
Proc. 26th ACM Symp. on Principles of Programming Languages (POPL)
, pp. 214-227
-
-
Xi, H.1
Pfenning, F.2
-
27
-
-
0036761582
-
Secure information flow via linear continuations
-
September
-
Steve Zdancewic and Andrew C. Myers. Secure information flow via linear continuations. Higher Order and Symbolic Computation, 15(2-3):209-234, September 2002.
-
(2002)
Higher Order and Symbolic Computation
, vol.15
, Issue.2-3
, pp. 209-234
-
-
Zdancewic, S.1
Myers, A.C.2
-
28
-
-
84942242915
-
Observational determinism for concurrent program security
-
In, Pacific Grove, California, June
-
Steve Zdancewic and Andrew C. Myers. Observational determinism for concurrent program security. In Proc. 16th IEEE Computer Security Foundations Workshop, pages 29-43, Pacific Grove, California, June 2003.
-
(2003)
Proc. 16th IEEE Computer Security Foundations Workshop
, pp. 29-43
-
-
Zdancewic, S.1
Myers, A.C.2
-
29
-
-
33745193613
-
-
Technical Report 2004-1924, Cornell University Computing and Information Science
-
Lantian Zheng and Andrew C. Myers. Dynamic security labels and noninterference. Technical Report 2004-1924, Cornell University Computing and Information Science, 2004.
-
(2004)
Dynamic security labels and noninterference
-
-
Zheng, L.1
Myers, A.C.2
|