-
1
-
-
0005363804
-
A core calculus of dependency
-
Abadi, M., Banerjee, A., Heintze N. and Rieck, J.G. : A core calculus of dependency, Proc. of POPL, pp. 147-169, 1999.
-
(1999)
Proc. of POPL
, pp. 147-169
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Rieck, J.G.4
-
2
-
-
0033702592
-
Transforming out timing leaks
-
Agat, J. : Transforming out timing leaks, Proc. of POPL, pp. 40-53, 2000.
-
(2000)
Proc. of POPL
, pp. 40-53
-
-
Agat, J.1
-
3
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning, D.E. and Denning, P.J. : Certification of programs for secure information flow, Comm. of the ACM, Vol. 20, No. 7, pp. 504-513, 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
4
-
-
0031701347
-
The slam calculus: programming with secrecy and integrity
-
Heintze, N. and Riecke, J. : The slam calculus: programming with secrecy and integrity, Proc. of POPL, pp. 365-377, 1998.
-
(1998)
Proc. of POPL
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.2
-
5
-
-
84947269249
-
Secure information flow as typed process behaviour
-
2000, of LNCS, Springer-Verlag, 2000
-
Honda, K. Vasconcelos, V. and Yoshida, N. : Secure information flow as typed process behaviour, Proc. of European Symposium on Programming (ESOP) 2000, Vol. 1782 of LNCS, pp. 180-199, Springer-Verlag, 2000.
-
Proc. of European Symposium on Programming (ESOP)
, vol.1782
, pp. 180-199
-
-
Honda, K.1
Vasconcelos, V.2
Yoshida, N.3
-
6
-
-
0036040303
-
A uniform type structure for secure information flow
-
Honda, K. and Yoshida, N. : A uniform type structure for secure information flow, Proc. of POPL, pp. 81-92, 2002.
-
(2002)
Proc. of POPL
, pp. 81-92
-
-
Honda, K.1
Yoshida, N.2
-
7
-
-
0034714632
-
-
Igarashi, A. and Kobayashi, N. : Type reconstruction for linear pi-calculus with I/O subtyping, Info. Comput., Vol. 161, pp. 1-44, 2000.
-
(2000)
Type reconstruction for linear pi-calculus with I/O subtyping, Info. Comput.
, vol.161
, pp. 1-44
-
-
Igarashi, A.1
Kobayashi, N.2
-
8
-
-
0036233375
-
A portable approach to dynamic optimization in run-time specialization
-
Masuhara, H. and Yonezawa, A. : A portable approach to dynamic optimization in run-time specialization, New Generation Computing, Vol. 20, No. 1, pp. 101-124, 2002.
-
(2002)
New Generation Computing
, vol.20
, Issue.1
, pp. 101-124
-
-
Masuhara, H.1
Yonezawa, A.2
-
9
-
-
22444452798
-
-
of LNCS
-
Mogensen, T. : Types for 0, 1 or many uses, Implementation of Functional Languages, Vol. 1467 of LNCS, pp. 112-122, 1998.
-
(1998)
Types for 0, 1 or many uses, Implementation of Functional Languages
, vol.1467
, pp. 112-122
-
-
Mogensen, T.1
-
10
-
-
0041525084
-
-
Morrisett, J.G., Walker, D., Crary, K. and Glew, N. : From system F to typed assembly language, ACM Trans. Prog. Lang. Syst., Vol. 21, No. 3, pp. 527-568, 1999.
-
(1999)
From system F to typed assembly language, ACM Trans. Prog. Lang. Syst.
, vol.21
, Issue.3
, pp. 527-568
-
-
Morrisett, J.G.1
Walker, D.2
Crary, K.3
Glew, N.4
-
12
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
Myers, A.C. : JFlow: Practical mostly-static information flow control, Proc. of POPL, pp. 228-241, 1999.
-
(1999)
Proc. of POPL
, pp. 228-241
-
-
Myers, A.C.1
-
15
-
-
0036037318
-
Information flow inference for ML
-
Pottier, F. and Simonet, V. : Information flow inference for ML, Proc. of POPL, pp. 319-330, 2002.
-
(2002)
Proc. of POPL
, pp. 319-330
-
-
Pottier, F.1
Simonet, V.2
-
16
-
-
0033225348
-
Tractable constraints in finite semilattices
-
Rehof, J. and Mogensen, T. : Tractable constraints in finite semilattices, Science of Computer Programming, Vol. 35, No. 2, pp. 191-221, 1999.
-
(1999)
Science of Computer Programming
, vol.35
, Issue.2
, pp. 191-221
-
-
Rehof, J.1
Mogensen, T.2
-
17
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
Smith, G. and Volpano, D. : Secure information flow in a multi-threaded imperative language, Proc. of POPL, pp. 355-364, 1998.
-
(1998)
Proc. of POPL
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
18
-
-
0002335588
-
A type system for java bytecode subroutines
-
Stata, R. and Abadi, M. : A type system for java bytecode subroutines, ACM Trans. Prog. Lang. Syst., Vol. 21, No. 1, pp. 90-137, 1999.
-
(1999)
ACM Trans. Prog. Lang. Syst.
, vol.21
, Issue.1
, pp. 90-137
-
-
Stata, R.1
Abadi, M.2
-
20
-
-
0033705210
-
Verifying secrets and relative secrecy
-
Volpano, D. and Smith, G. : Verifying secrets and relative secrecy, Proc. of POPL, pp. 268-276, 2000.
-
(2000)
Proc. of POPL
, pp. 268-276
-
-
Volpano, D.1
Smith, G.2
-
21
-
-
0030370740
-
A sound type system for secure flow analysis
-
Volpano, D., Smith, G. and Irvine, C. : A sound type system for secure flow analysis, Journal of Computer Security, Vol. 4, No. 3, pp. 167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
22
-
-
85024713573
-
Secure information flow via linear continuations, Higher-Order and Symbolic Computation
-
To appear. Springer LNCS 2028
-
Zdancewic, S. and Myers, A.C. : Secure information flow via linear continuations, Higher-Order and Symbolic Computation, 2002, To appear. A preliminary version appeared in Proceedings of ESOP 2001, Springer LNCS 2028, pp. 46-61.
-
(2002)
A preliminary version appeared in Proceedings of ESOP 2001
, pp. 46-61
-
-
Zdancewic, S.1
Myers, A.C.2
|