-
1
-
-
0027565268
-
What’s in a region? Or computing control dependence regions in nearlinear time for reducible control flow
-
March-December
-
T. Ball. What’s in a region? Or computing control dependence regions in nearlinear time for reducible control flow. ACM Letters on Programming Languages and Systems, 2(1-4):1-16, March-December 1993
-
(1993)
ACM Letters on Programming Languages and Systems
, vol.2
, Issue.1-4
, pp. 1-16
-
-
Ball, T.1
-
2
-
-
84948752619
-
Secure Information Flow and Pointer Confinement in a Java-like Language
-
IEEE Computer Society Press
-
A. Banerjee and D. A. Naumann. Secure Information Flow and Pointer Confinement in a Java-like Language. In Proceedings of CSFW’02. IEEE Computer Society Press, 2002
-
(2002)
Proceedings of CSFW’02
-
-
Banerjee, A.1
Naumann, D.A.2
-
3
-
-
84957671171
-
Partial evaluation and non-interference for object calculi
-
A. Middeldorp and T. Sato, editors,, volume 1722 of Lecture Notes in Computer Science, Springer-Verlag
-
G. Barthe and B. Serpette. Partial evaluation and non-interference for object calculi. In A. Middeldorp and T. Sato, editors, Proceedings of FLOPS’99, volume 1722 of Lecture Notes in Computer Science, pages 53-67. Springer-Verlag, 1999. 2 See http://www.dcs.ed.ac.uk/home/mrg
-
(1999)
Proceedings of FLOPS’99
, pp. 53-67
-
-
Barthe, G.1
Serpette, B.2
-
4
-
-
84894622815
-
Combining Abstract Interpretation and Model Checking for analysing Security Properties of Java Bytecode
-
C. Bernardeschi and N. De Francesco. Combining Abstract Interpretation and Model Checking for analysing Security Properties of Java Bytecode. In A. Cortesi, editor, Proceedings of VMCAI’02, volume 2294 of Lecture Notes in Computer Science, pages 1-15, 2002
-
(2002)
A. Cortesi, Editor, Proceedings of VMCAI’02, Volume 2294 of Lecture Notes in Computer Science
, pp. 1-15
-
-
Bernardeschi, C.1
De Francesco, N.2
-
5
-
-
0036425267
-
Checking Secure Interactions of Smart Card Applets: Extended version
-
P. Bieber, J. Cazin, V. Wiels, G. Zanon, P. Girard, and J.-L. Lanet. Checking Secure Interactions of Smart Card Applets: Extended version. Journal of Computer Security, 10:369-398, 2002
-
(2002)
Journal of Computer Security
, vol.10
, pp. 369-398
-
-
Bieber, P.1
Cazin, J.2
Wiels, V.3
Zanon, G.4
Girard, P.5
Lanet, J.-L.6
-
6
-
-
35048837003
-
Simple Verification Technique for Complex Java Bytecode Subroutines
-
A. Coglio. Simple Verification Technique for Complex Java Bytecode Subroutines. In Proceedings of FTFJP’02, 2002
-
(2002)
Proceedings of FTFJP’02
-
-
Coglio, A.1
-
7
-
-
0020299523
-
Security policies and security models
-
IEEE Computer Society
-
J. Goguen and J. Meseguer. Security policies and security models. In Proceedings of SOSP’82, pages 11-22. IEEE Computer Society, 1982
-
(1982)
Proceedings of SOSP’82
, pp. 11-22
-
-
Goguen, J.1
Meseguer, J.2
-
8
-
-
0031701347
-
The SLam calculus: Programming with secrecy and integrity
-
ACM Press
-
N. Heintze and J. Riecke. The SLam calculus: programming with secrecy and integrity. In Proceedings of POPL’98, pages 365-377. ACM Press, 1998
-
(1998)
Proceedings of POPL’98
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.2
-
9
-
-
0036040303
-
A Uniform Type Structure for Secure Information Flow
-
ACM Press
-
K. Honda and N. Yoshida. A Uniform Type Structure for Secure Information Flow. In Proceedings of POPL’02, pages 81-92. ACM Press, 2002
-
(2002)
Proceedings of POPL’02
, pp. 81-92
-
-
Honda, K.1
Yoshida, N.2
-
10
-
-
35248841030
-
Precision in Practice: A Type-Preserving Java Compiler
-
Springer-Verlag
-
C. League, Z. Shao, and V. Trifonov. Precision in Practice: A Type-Preserving Java Compiler. In G. Hedin, editor, Proceddings of CC’03, volume 2622 of Lecture Notes in Computer Science, pages 106-120. Springer-Verlag, 2003
-
(2003)
G. Hedin, Editor, Proceddings of CC’03, Volume 2622 of Lecture Notes in Computer Science
, pp. 106-120
-
-
League, C.1
Shao, Z.2
Trifonov, V.3
-
11
-
-
84958745294
-
Java bytecode verification: An overview
-
Springer-Verlag
-
X. Leroy. Java bytecode verification: an overview. In G. Berry, H. Comon, and A. Finkel, editors, Proceedings of CAV’01, volume 2102 of Lecture Notes in Computer Science, pages 265-285. Springer-Verlag, 2001
-
(2001)
G. Berry, H. Comon, and A. Finkel, Editors, Proceedings of CAV’01, Volume 2102 of Lecture Notes in Computer Science
, pp. 265-285
-
-
Leroy, X.1
-
12
-
-
0032646625
-
Jflow: Practical mostly-static information flow control
-
ACM Press
-
A.C. Myers. Jflow: Practical mostly-static information flow control. In Proceedings of POPL’99, pages 228-241. ACM Press, 1999
-
(1999)
Proceedings of POPL’99
, pp. 228-241
-
-
Myers, A.C.1
-
13
-
-
0030685617
-
Proof-Carrying Code
-
ACM Press
-
G. C. Necula. Proof-Carrying Code. In Proceedings of POPL’97, pages 106-119. ACM Press, 1997
-
(1997)
Proceedings of POPL’97
, pp. 106-119
-
-
Necula, G.C.1
-
14
-
-
0031632699
-
The Design and Implementation of a Certifying Compiler
-
G. C. Necula and P. Lee. The Design and Implementation of a Certifying Compiler. In Proceedings of PLDI’98, pages 333-344, 1998
-
(1998)
Proceedings of PLDI’98
, pp. 333-344
-
-
Necula, G.C.1
Lee, P.2
-
17
-
-
0346925420
-
Fine-grained Information Flow Analysis for a Lambda-Calculus with Sum Types
-
V. Simonet. Fine-grained Information Flow Analysis for a Lambda-Calculus with Sum Types. In Proceedings of CSFW’02, pages 223-237, 2002
-
(2002)
Proceedings of CSFW’02
, pp. 223-237
-
-
Simonet, V.1
-
18
-
-
84956989228
-
A Type-Based Approach to Program Security
-
Springer-Verlag
-
D. Volpano and G. Smith. A Type-Based Approach to Program Security. In M. Bidoit and M. Dauchet, editors, Proceedings ofTAPSOFT’97, volume 1214 of Lecture Notes in Computer Science, pages 607-621. Springer-Verlag, 1997
-
(1997)
M. Bidoit and M. Dauchet, Editors, Proceedings ofTAPSOFT’97, Volume 1214 of Lecture Notes in Computer Science
, pp. 607-621
-
-
Volpano, D.1
Smith, G.2
-
19
-
-
0030673701
-
Eliminating covert flows with minimum typings
-
IEEE Press
-
D. Volpano and G. Smith. Eliminating covert flows with minimum typings. In Proceedings of CSFW’97, pages 156-168. IEEE Press, 1997
-
(1997)
Proceedings of CSFW’97
, pp. 156-168
-
-
Volpano, D.1
Smith, G.2
-
21
-
-
84945262623
-
Secure information flow and CPS
-
Springer-Verlag
-
S. Zdancewic and A. Myers. Secure information flow and CPS. In D. Sands, editor, Proceedings of ESOP’01, volume 2028 of Lecture Notes in Computer Science, pages 46-61. Springer-Verlag, 2001
-
(2001)
D. Sands, Editor, Proceedings of ESOP’01, Volume 2028 of Lecture Notes in Computer Science
, pp. 46-61
-
-
Zdancewic, S.1
Myers, A.2
|