메뉴 건너뛰기




Volumn 20, Issue 2, 2003, Pages 118-137

Type-based Information Flow Analysis for a Low-level Language

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85024737217     PISSN: 02896540     EISSN: None     Source Type: Journal    
DOI: 10.11309/jssst.20.118     Document Type: Article
Times cited : (4)

References (22)
  • 2
    • 0033702592 scopus 로고    scopus 로고
    • Transforming out timing leaks
    • Agat, J. : Transforming out timing leaks, Proc. of POPL, pp. 40-53, 2000.
    • (2000) Proc. of POPL , pp. 40-53
    • Agat, J.1
  • 3
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning, D.E. and Denning, P.J. : Certification of programs for secure information flow, Comm. of the ACM, Vol. 20, No. 7, pp. 504-513, 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 4
    • 0031701347 scopus 로고    scopus 로고
    • The slam calculus: programming with secrecy and integrity
    • Heintze, N. and Riecke, J. : The slam calculus: programming with secrecy and integrity, Proc. of POPL, pp. 365-377, 1998.
    • (1998) Proc. of POPL , pp. 365-377
    • Heintze, N.1    Riecke, J.2
  • 6
    • 0036040303 scopus 로고    scopus 로고
    • A uniform type structure for secure information flow
    • Honda, K. and Yoshida, N. : A uniform type structure for secure information flow, Proc. of POPL, pp. 81-92, 2002.
    • (2002) Proc. of POPL , pp. 81-92
    • Honda, K.1    Yoshida, N.2
  • 8
    • 0036233375 scopus 로고    scopus 로고
    • A portable approach to dynamic optimization in run-time specialization
    • Masuhara, H. and Yonezawa, A. : A portable approach to dynamic optimization in run-time specialization, New Generation Computing, Vol. 20, No. 1, pp. 101-124, 2002.
    • (2002) New Generation Computing , vol.20 , Issue.1 , pp. 101-124
    • Masuhara, H.1    Yonezawa, A.2
  • 12
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • Myers, A.C. : JFlow: Practical mostly-static information flow control, Proc. of POPL, pp. 228-241, 1999.
    • (1999) Proc. of POPL , pp. 228-241
    • Myers, A.C.1
  • 15
    • 0036037318 scopus 로고    scopus 로고
    • Information flow inference for ML
    • Pottier, F. and Simonet, V. : Information flow inference for ML, Proc. of POPL, pp. 319-330, 2002.
    • (2002) Proc. of POPL , pp. 319-330
    • Pottier, F.1    Simonet, V.2
  • 16
    • 0033225348 scopus 로고    scopus 로고
    • Tractable constraints in finite semilattices
    • Rehof, J. and Mogensen, T. : Tractable constraints in finite semilattices, Science of Computer Programming, Vol. 35, No. 2, pp. 191-221, 1999.
    • (1999) Science of Computer Programming , vol.35 , Issue.2 , pp. 191-221
    • Rehof, J.1    Mogensen, T.2
  • 17
    • 0031648455 scopus 로고    scopus 로고
    • Secure information flow in a multi-threaded imperative language
    • Smith, G. and Volpano, D. : Secure information flow in a multi-threaded imperative language, Proc. of POPL, pp. 355-364, 1998.
    • (1998) Proc. of POPL , pp. 355-364
    • Smith, G.1    Volpano, D.2
  • 18
    • 0002335588 scopus 로고    scopus 로고
    • A type system for java bytecode subroutines
    • Stata, R. and Abadi, M. : A type system for java bytecode subroutines, ACM Trans. Prog. Lang. Syst., Vol. 21, No. 1, pp. 90-137, 1999.
    • (1999) ACM Trans. Prog. Lang. Syst. , vol.21 , Issue.1 , pp. 90-137
    • Stata, R.1    Abadi, M.2
  • 20
    • 0033705210 scopus 로고    scopus 로고
    • Verifying secrets and relative secrecy
    • Volpano, D. and Smith, G. : Verifying secrets and relative secrecy, Proc. of POPL, pp. 268-276, 2000.
    • (2000) Proc. of POPL , pp. 268-276
    • Volpano, D.1    Smith, G.2
  • 21
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Volpano, D., Smith, G. and Irvine, C. : A sound type system for secure flow analysis, Journal of Computer Security, Vol. 4, No. 3, pp. 167-187, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3
  • 22
    • 85024713573 scopus 로고    scopus 로고
    • Secure information flow via linear continuations, Higher-Order and Symbolic Computation
    • To appear. Springer LNCS 2028
    • Zdancewic, S. and Myers, A.C. : Secure information flow via linear continuations, Higher-Order and Symbolic Computation, 2002, To appear. A preliminary version appeared in Proceedings of ESOP 2001, Springer LNCS 2028, pp. 46-61.
    • (2002) A preliminary version appeared in Proceedings of ESOP 2001 , pp. 46-61
    • Zdancewic, S.1    Myers, A.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.