-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
September
-
M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, September 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
3
-
-
84937555465
-
Secrecy types for asymmetric communication
-
April
-
M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. In FOSSACS'01, LNCS 2030, pages 25-41, April 2001.
-
(2001)
FOSSACS'01, LNCS 2030
, pp. 25-41
-
-
Abadi, M.1
Blanchet, B.2
-
5
-
-
85083027758
-
Reconciling two views of cryptography (The computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal ofCryptology, 15(2), 2002.
-
(2002)
Journal Ofcryptology
, vol.15
, Issue.2
-
-
Abadi, M.1
Rogaway, P.2
-
9
-
-
0004255836
-
-
Prentice-Hall, 2nd edition
-
J. Armstrong, R. Virding, C. Wikstrom, and M. Williams. Concurrent Programming in Erlang. Prentice-Hall, 2nd edition, 1996.
-
(1996)
Concurrent Programming in Erlang
-
-
Armstrong, J.1
Virding, R.2
Wikstrom, C.3
Williams, M.4
-
12
-
-
84879520825
-
Noninterference for concurrent programs
-
July
-
G. Boudol and I. Castellani. Noninterference for concurrent programs. In ICALP'01, LNCS 2076, pages 382-395, July 2001.
-
(2001)
ICALP'01, LNCS 2076
, pp. 382-395
-
-
Boudol, G.1
Castellani, I.2
-
13
-
-
84976675687
-
Information transmission in computational systems
-
E. S. Cohen. Information transmission in computational systems. ACM SIGOPS Operating Systems Review, 11(5):133-139, 1977.
-
(1977)
ACM SIGOPS Operating Systems Review
, vol.11
, Issue.5
, pp. 133-139
-
-
Cohen, E.S.1
-
14
-
-
0001760770
-
Information transmission in sequential programs
-
R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Academic Press
-
E. S. Cohen. Information transmission in sequential programs. In R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, editors, Foundations of Secure Computation, pages 297-335. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 297-335
-
-
Cohen, E.S.1
-
15
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
17
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, July 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
18
-
-
84974776068
-
A classification of security properties for process algebras
-
R. Focardi and R. Gorrieri. A classification of security properties for process algebras. Journal of Computer Security, 3(1):5-33, 1995.
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
23
-
-
84974577536
-
Information flow vs resource access in the asynchronous pi-calculus (Extended abstract)
-
M. Hennessy and J. Riely. Information flow vs resource access in the asynchronous pi-calculus (extended abstract). In ICALP'00, LNCS 1853, pages 415-427, 2000.
-
(2000)
ICALP'00, LNCS 1853
, pp. 415-427
-
-
Hennessy, M.1
Riely, J.2
-
25
-
-
84947269249
-
Secure information flow as typed process behaviour
-
K. Honda, V. Vasconcelos, and N. Yoshida. Secure information flow as typed process behaviour. In Proc. ofEuropean Symposium on Programming, LNCS 1782, pages 180-199, 2000.
-
(2000)
Proc. Ofeuropean Symposium on Programming, LNCS 1782
, pp. 180-199
-
-
Honda, K.1
Vasconcelos, V.2
Yoshida, N.3
-
27
-
-
0015672289
-
A note on the confinement problem. Commun
-
Oct
-
B. W. Lampson. A note on the confinement problem. Commun. ACM, 16(10):613-615, Oct. 1973.
-
(1973)
ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
29
-
-
0033751850
-
A semantic approach to secure information flow
-
K. R. M. Leino and R. Joshi. A semantic approach to secure information flow. Science ofComputer Programming, 37(1-3):113-138, 2000.
-
(2000)
Science Ofcomputer Programming
, vol.37
, Issue.1-3
, pp. 113-138
-
-
Leino, K.1
Joshi, R.2
-
33
-
-
84872691539
-
A unifying approach to the security of distributed and multi-threaded programs
-
To appear
-
H. Mantel and A. Sabelfeld. A unifying approach to the security of distributed and multi-threaded programs. Journal ofComputer Security, 2002. To appear.
-
(2002)
Journal Ofcomputer Security
-
-
Mantel, H.1
Sabelfeld, A.2
-
34
-
-
0023231848
-
Specifications for multi-level security and hook-up property
-
May
-
D. McCullough. Specifications for multi-level security and hook-up property. In Proc. ofIEEE Symposium on Security and Privacy, pages 161-166. May 1987.
-
(1987)
Proc. Ofieee Symposium on Security and Privacy
, pp. 161-166
-
-
McCullough, D.1
-
35
-
-
0025211594
-
The specification and modeling of computer security
-
January
-
J. McLean. The specification and modeling of computer security. Computer, 23(1), January 1990.
-
(1990)
Computer
, vol.23
, Issue.1
-
-
McLean, J.1
-
36
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proc. ofIEEE Symposium on Security and Privacy, 1994.
-
(1994)
Proc. Ofieee Symposium on Security and Privacy
-
-
McLean, J.1
-
38
-
-
0012781083
-
Information flow control in a distributed object-oriented system with statically-bound object variables
-
M. Mizuno and A. Oldehoeft. Information flow control in a distributed object-oriented system with statically-bound object variables. In Proc. ofNational Computer Security Conference, pages 56-67, 1987.
-
(1987)
Proc. Ofnational Computer Security Conference
, pp. 56-67
-
-
Mizuno, M.1
Oldehoeft, A.2
-
39
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. of IEEE Symposium on Security and Privacy, pages 184-200, 2001.
-
(2001)
Proc. of IEEE Symposium on Security and Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
42
-
-
0003777431
-
-
Addison-Wesley
-
P. Ryan, S. Schneider, M. Goldsmith, G. Lowe, and B. Roscoe. The Modelling and Analysis ofSecurity Protocols: the CSP Approach. Addison-Wesley, 2001.
-
(2001)
The Modelling and Analysis Ofsecurity Protocols: The CSP Approach
-
-
Ryan, P.1
Schneider, S.2
Goldsmith, M.3
Lowe, G.4
Roscoe, B.5
-
45
-
-
0035276729
-
A per model of secure information flow in sequential programs
-
A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher-Order and Symbolic Computation, 14(1):59-91, 2001.
-
(2001)
Higher-Order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
49
-
-
0033330060
-
Probabilistic noninterference in a concurrent language
-
November
-
D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. Journal ofComputer Security, 7(23):231-253, November 1999.
-
(1999)
Journal Ofcomputer Security
, vol.7
, Issue.23
, pp. 231-253
-
-
Volpano, D.1
Smith, G.2
-
50
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal ofComputer Security, 4(3):167-187, 1996.
-
(1996)
Journal Ofcomputer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|