-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
Oct
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, Oct. 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
2
-
-
0029700344
-
Decentralized trust management
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on, pages 164-173, 1996.
-
(1996)
Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
5
-
-
84869486902
-
Abstractions for usable information flow control in Aeolus
-
W. Cheng, D. Ports, D. Schultz, V. Popic, A. Blankstein, J. Cowling, D. Curtis, L. Shrira, and B. Liskov. Abstractions for usable information flow control in Aeolus. In Proceedings of the 2012 USENIX Annual Technical Conference, 2012.
-
(2012)
Proceedings of the 2012 USENIX Annual Technical Conference
-
-
Cheng, W.1
Ports, D.2
Schultz, D.3
Popic, V.4
Blankstein, A.5
Cowling, J.6
Curtis, D.7
Shrira, L.8
Liskov, B.9
-
8
-
-
41149124878
-
-
Oct
-
S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, and X. Zheng. Secure web applications via automatic partitioning. pages 31-44, Oct. 2007.
-
(2007)
Secure Web Applications Via Automatic Partitioning
, pp. 31-44
-
-
Chong, S.1
Liu, J.2
Myers, A.C.3
Qi, X.4
Vikram, K.5
Zheng, L.6
Zheng, X.7
-
9
-
-
84877700103
-
SIF: Enforcing confidentiality and integrity in web applications
-
Aug
-
S. Chong, K. Vikram, and A. C. Myers. Sif: Enforcing confidentiality and integrity in web applications. In Proc. USENIX Security Symposium, pages 1-16, Aug. 2007.
-
(2007)
Proc. USENIX Security Symposium
, pp. 1-16
-
-
Chong, S.1
Vikram, K.2
Myers, A.C.3
-
14
-
-
85076881031
-
-
September
-
Google. Google code prettify, September 2012. http://code.google.com/p/google-code-prettify/.
-
(2012)
Google Code Prettify
-
-
-
15
-
-
85076888452
-
Exceptionally available dynamic IFC
-
July
-
C. Hritcu, M. Greenberg, B. Karel, B. C. Pierce, and G. Morrisett. Exceptionally available dynamic IFC. Submitted to POPL, July 2012.
-
(2012)
Submitted to POPL
-
-
Hritcu, C.1
Greenberg, M.2
Karel, B.3
Pierce, B.C.4
Morrisett, G.5
-
17
-
-
57749192483
-
Information flow control for standard OS abstractions
-
October
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information flow control for standard OS abstractions. In Proceedings of the 21st Symposium on Operating Systems Principles, October 2007.
-
(2007)
Proceedings of the 21st Symposium on Operating Systems Principles
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
18
-
-
84918562537
-
A world wide web without walls
-
Atlanta, GA, November
-
M. Krohn, A. Yip, M. Brodsky, R. Morris, and M. Walfish. A World Wide Web Without Walls. In 6th ACM Workshop on Hot Topics in Networking (Hotnets), Atlanta, GA, November 2007.
-
(2007)
6th ACM Workshop on Hot Topics in Networking (Hotnets)
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Morris, R.4
Walfish, M.5
-
19
-
-
85084164558
-
Statically detecting likely buffer overflow vulnerabilities
-
August
-
D. Larochelle and D. Evans. Statically detecting likely buffer overflow vulnerabilities. In USENIX Security Symposium, August 2001.
-
(2001)
USENIX Security Symposium
-
-
Larochelle, D.1
Evans, D.2
-
22
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
Feb
-
N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, Feb. 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
24
-
-
72549083642
-
Fabric: A platform for secure distributed computation and storage
-
Big Sky, MT, October
-
J. Liu, M. D. George, K. Vikram, X. Qi, L. Waye,, and A. C. Myers. Fabric: A platform for secure distributed computation and storage. In Proceedings of the 22nd ACM Symposium on Operating Systems Principles, Big Sky, MT, October 2009.
-
(2009)
Proceedings of the 22nd ACM Symposium on Operating Systems Principles
-
-
Liu, J.1
George, M.D.2
Vikram, K.3
Qi, X.4
Waye, L.5
Myers, A.C.6
-
28
-
-
70349127409
-
-
June
-
M. Miller, M. Samuel, B. Laurie, I. Awad, and M. Stay. Caja: Safe active content in sanitized javascript. http://google-caja.googlecode.com/files/caja-spec-2008-06-07.pdf, June 2008.
-
(2008)
Caja: Safe Active Content in Sanitized Javascript
-
-
Miller, M.1
Samuel, M.2
Laurie, B.3
Awad, I.4
Stay, M.5
-
30
-
-
85076927517
-
-
Draft, July
-
B. Montagu, B. Pierce, R. Pollack, and A. Surée. A theory of information-flow labels. Draft, July, 2012.
-
(2012)
A Theory of Information-Flow Labels
-
-
Montagu, B.1
Pierce, B.2
Pollack, R.3
Surée, A.4
-
33
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
October
-
A. C. Myers and B. Liskov. Protecting privacy using the decentralized label model. ACM Transactions on Computer Systems, 9(4):410-442, October 2000.
-
(2000)
ACM Transactions on Computer Systems
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
-
35
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
36
-
-
85076912703
-
-
September
-
Sinatra. Sinatra, September 2012. http://www.sinatrarb.com/.
-
(2012)
Sinatra
-
-
-
37
-
-
82655182920
-
Logical attestation: An authorization architecture for trustworthy computing
-
E. Sirer, W. de Bruijn, P. Reynolds, A. Shieh, K. Walsh, D. Williams, and F. Schneider. Logical attestation: an authorization architecture for trustworthy computing. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pages 249-264, 2011.
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
, pp. 249-264
-
-
Sirer, E.1
De Bruijn, W.2
Reynolds, P.3
Shieh, A.4
Walsh, K.5
Williams, D.6
Schneider, F.7
-
40
-
-
82655162714
-
Flexible dynamic information flow control in Haskell
-
September
-
D. Stefan, A. Russo, J. C. Mitchell, and D. Mazières. Flexible dynamic information flow control in Haskell. In Proceedings of the 4th Symposium on Haskell, pages 95-106, September 2011.
-
(2011)
Proceedings of the 4th Symposium on Haskell
, pp. 95-106
-
-
Stefan, D.1
Russo, A.2
Mitchell, J.C.3
Mazières, D.4
-
41
-
-
84870438524
-
Addressing covert termination and timing channels in concurrent information flow systems
-
D. Stefan, A. Russo, P. Buiras, A. Levy, J. C. Mitchell, and D. Mazières. Addressing covert termination and timing channels in concurrent information flow systems. In The 17th ACM SIGPLAN International Conference on Functional Programming (ICFP), 2012.
-
(2012)
The 17th ACM SIGPLAN International Conference on Functional Programming (ICFP)
-
-
Stefan, D.1
Russo, A.2
Buiras, P.3
Levy, A.4
Mitchell, J.C.5
Mazières, D.6
-
43
-
-
80052006519
-
Automated analysis of security-critical javascript APIs
-
A. Taly, Ú. Erlingsson, J. C. Mitchell, M. S. Miller, and J. Nagra. Automated analysis of security-critical javascript APIs. In IEEE Symposium on Security and Privacy, 2011.
-
(2011)
IEEE Symposium on Security and Privacy
-
-
Taly, A.1
Erlingsson, Ú.2
Mitchell, J.C.3
Miller, M.S.4
Nagra, J.5
-
46
-
-
84888352157
-
Making information flow explicit in HiStar
-
Seattle, WA, November
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazières. Making information flow explicit in HiStar. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, pages 263-278, Seattle, WA, November 2006.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation
, pp. 263-278
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
-
47
-
-
59449105095
-
Using replication and partitioning to build secure distributed systems
-
SP'03, Washington, DC, USA, IEEE Computer Society
-
L. Zheng, S. Chong, A. C. Myers, and S. Zdancewic. Using replication and partitioning to build secure distributed systems. In Proceedings of the 2003 IEEE Symposium on Security and Privacy, SP'03, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
-
-
Zheng, L.1
Chong, S.2
Myers, A.C.3
Zdancewic, S.4
|