-
1
-
-
0032681509
-
A core calculus of dependency
-
San Antonio, TX, Jan.
-
M. Abadi, A. Banerjee, N. Heintze, and J. Riecke. A core calculus of dependency. In Proc. 26th ACM Symp. on Principles of Programming Languages (POPL), pages 147-160, San Antonio, TX, Jan. 1999.
-
(1999)
Proc. 26th ACM Symp. on Principles of Programming Languages (POPL)
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.4
-
2
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Jan.
-
M. Abadi and A. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, Jan. 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.2
-
5
-
-
0037014243
-
Noninterference for concurrent programs and thread systems
-
June
-
G. Boudol and I. Castellani. Noninterference for concurrent programs and thread systems. Merci, Maurice, A mosaic in honour of Maurice Nivat, 281(1):109-130, June 2002.
-
(2002)
Merci, Maurice, a Mosaic in Honour of Maurice Nivat
, vol.281
, Issue.1
, pp. 109-130
-
-
Boudol, G.1
Castellani, I.2
-
6
-
-
84942269351
-
Modular information flow analysis for process calculi
-
I. Cervesato, editor
-
S. Conchon. Modular information flow analysis for process calculi. In I. Cervesato, editor, Proc. Foundations of Computer Security Workshop, Copenhagen, Denmark, 2002.
-
Proc. Foundations of Computer Security Workshop, Copenhagen, Denmark, 2002
-
-
Conchon, S.1
-
7
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning. A lattice model of secure information flow. Comm. of the ACM, 19(5):236-243, May 1976.
-
(1976)
Comm. of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
8
-
-
0017517624
-
Certification of Programs for Secure Information Flow
-
July
-
D. E. Denning and P. J. Denning. Certification of Programs for Secure Information Flow. Comm. of the ACM, 20(7):504-513, July 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
12
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
Sept.
-
R. Focardi and R. Gorrieri. The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23(9), Sept. 1997.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
-
-
Focardi, R.1
Gorrieri, R.2
-
16
-
-
0026850049
-
A logical approach to multilevel security of probabilistic systems
-
IEEE Computer Society Press
-
J. Gray III and P. F. Syverson. A logical approach to multilevel security of probabilistic systems. In Proceedings of the IEEE Symposium on Security and Privacy, pages 164-176. IEEE Computer Society Press, 1992.
-
(1992)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 164-176
-
-
Gray, J.1
Syverson, P.F.2
-
20
-
-
0015672289
-
A note on the confinement problem
-
Oct.
-
B. W. Lampson. A note on the confinement problem. Comm. of the ACM, 16(10):613-615, Oct. 1973.
-
(1973)
Comm. of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
22
-
-
84872691539
-
A unifying approach to the security of distributed and multi-threaded programs
-
To appear
-
H. Mantel and A. Sabelfeld. A unifying approach to the security of distributed and multi-threaded programs. Journal of Computer Security, 2002. To appear.
-
(2002)
Journal of Computer Security
-
-
Mantel, H.1
Sabelfeld, A.2
-
23
-
-
0023829319
-
Noninterference and the composability of security properties
-
IEEE Computer Society Press, May
-
D. McCullough. Noninterference and the composability of security properties. In Proc. IEEE Symposium on Security and Privacy, pages 177-186. IEEE Computer Society Press, May 1988.
-
(1988)
Proc. IEEE Symposium on Security and Privacy
, pp. 177-186
-
-
McCullough, D.1
-
24
-
-
84974747891
-
Proving noninterference and functional correctness using traces
-
J. McLean. Proving noninterference and functional correctness using traces. Journal of Computer Security, 1(1), 1992.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.1
-
-
McLean, J.1
-
25
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
IEEE Computer Society Press, May
-
J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proc. IEEE Symposium on Security and Privacy, pages 79-93. IEEE Computer Society Press, May 1994.
-
(1994)
Proc. IEEE Symposium on Security and Privacy
, pp. 79-93
-
-
McLean, J.1
-
26
-
-
44049113210
-
A calculus of mobile processes
-
R. Milner, J. Parrow, and D. Walker. A calculus of mobile processes. Information and Computation, 100(1):1-77, 1992.
-
(1992)
Information and Computation
, vol.100
, Issue.1
, pp. 1-77
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
28
-
-
84955596529
-
Trust in the λ-calculus
-
Proc. 2nd International Symposium on Static Analysis, Springer, Sept.
-
J. Palsberg and P. Ørbæk. Trust in the λ-calculus. In Proc. 2nd International Symposium on Static Analysis, number 983 in Lecture Notes in Computer Science, pages 314-329. Springer, Sept. 1995.
-
(1995)
Lecture Notes in Computer Science
, Issue.983
, pp. 314-329
-
-
Palsberg, J.1
Ørbæk, P.2
-
34
-
-
0003142759
-
A CSP formulation of non-interference and unwinding
-
P. Ryan. A CSP formulation of non-interference and unwinding. Cipher, pages 19-30, 1991.
-
(1991)
Cipher
, pp. 19-30
-
-
Ryan, P.1
-
36
-
-
84958755151
-
Static confidentiality enforcement for distributed programs
-
Proceedings of the 9th Static Analysis Symposium, Springer- Verlag
-
A. Sabelfeld and H. Mantel. Static confidentiality enforcement for distributed programs. In Proceedings of the 9th Static Analysis Symposium, volume 2477 of Lecture Notes in Computer Science. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2477
-
-
Sabelfeld, A.1
Mantel, H.2
-
40
-
-
84947255140
-
Alias types
-
Proc. of the 9th European Symposium on Programming
-
F. Smith, D. Walker, and G. Morrisett. Alias types. In Proc. of the 9th European Symposium on Programming, volume 1782 of Lecture Notes in Computer Science, pages 366-381, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1782
, pp. 366-381
-
-
Smith, F.1
Walker, D.2
Morrisett, G.3
-
41
-
-
0034835461
-
A new type system for secure information flow
-
IEEE Computer Society Press, June
-
G. Smith. A new type system for secure information flow. In Proc. of the 14th IEEE Computer Security Foundations Workshop, pages 115-125. IEEE Computer Society Press, June 2001.
-
(2001)
Proc. of the 14th IEEE Computer Security Foundations Workshop
, pp. 115-125
-
-
Smith, G.1
-
43
-
-
0033330060
-
Probabilistic noninterference in a concurrent language
-
Nov.
-
D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. Journal of Computer Security, 7(2,3):231-253, Nov. 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 231-253
-
-
Volpano, D.1
Smith, G.2
-
45
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
49
-
-
0036761582
-
Secure information flow via linear continuations
-
Sept.
-
S. Zdancewic and A. C. Myers. Secure information flow via linear continuations. Higher Order and Symbolic Computation, 15(2-3):209-234, Sept. 2002.
-
(2002)
Higher Order and Symbolic Computation
, vol.15
, Issue.2-3
, pp. 209-234
-
-
Zdancewic, S.1
Myers, A.C.2
-
50
-
-
0037974191
-
Secure program partitioning
-
Aug.
-
S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers. Secure program partitioning. ACM Transactions on Computer Systems, 20(3):283-328, Aug. 2002.
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.3
, pp. 283-328
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.C.4
|