-
1
-
-
0030643343
-
A calculus for cryptographic protocols: The spi calculus
-
ABADI, M., AND GORDON, A. D. A calculus for cryptographic protocols: The spi calculus. In Proc. CCS (1997).
-
(1997)
Proc. CCS
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
0025386404
-
A logic of authentication
-
BURROWS, M., ABADI, M., AND NEEDHAM, R. A logic of authentication. ACM Trans. Comput. Syst. 8, 1 (1990), 18-36.
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
77954755242
-
UR: Statically-typed metaprogramming with type-level record computation
-
CHLIPALA, A. Ur: Statically-typed metaprogramming with type-level record computation. In Proc. PLDI (2010).
-
(2010)
Proc. PLDI
-
-
Chlipala, A.1
-
4
-
-
70450092979
-
Secure web applications via automatic partitioning
-
CHONG, S., LIU, J., MYERS, A. C., QI, X., VIKRAM, K., ZHENG, L., AND ZHENG, X. Secure web applications via automatic partitioning. In Proc. SOSP (2007).
-
(2007)
Proc. SOSP
-
-
Chong, S.1
Liu, J.2
Myers, A.C.3
Qi, X.4
Vikram, K.5
Zheng, L.6
Zheng, X.7
-
5
-
-
84877700103
-
SIF: Enforcing confidentiality and integrity in web applications
-
CHONG, S., VIKRAM, K., AND MYERS, A. C. SIF: Enforcing confidentiality and integrity in web applications. In Proc. USENIX Security (2007).
-
(2007)
Proc. USENIX Security
-
-
Chong, S.1
Vikram, K.2
Myers, A.C.3
-
6
-
-
49049121259
-
Links: Web programming without tiers
-
COOPER, E., LINDLEY, S., WADLER, P., AND YALLOP, J. Links: Web programming without tiers. In Proc. FMCO (2006).
-
(2006)
Proc. FMCO
-
-
Cooper, E.1
Lindley, S.2
Wadler, P.3
Yallop, J.4
-
7
-
-
70849107905
-
Cross-tier, label-based security enforcement for web applications
-
CORCORAN, B. J., SWAMY, N., AND HICKS, M. Cross-tier, label-based security enforcement for web applications. In Proc. SIGMOD (2009).
-
(2009)
Proc. SIGMOD
-
-
Corcoran, B.J.1
Swamy, N.2
Hicks, M.3
-
8
-
-
24944448541
-
Simplify: A theorem prover for program checking
-
DETLEFS, D., NELSON, G., AND SAXE, J. B. Simplify: a theorem prover for program checking. J. ACM 52, 3 (2005), 365-473.
-
(2005)
J. ACM
, vol.52
, Issue.3
, pp. 365-473
-
-
Detlefs, D.1
Nelson, G.2
Saxe, J.B.3
-
9
-
-
84885664275
-
Labels and event processes in the Asbestos operating system
-
EFSTATHOPOULOS, P., KROHN, M., VANDEBOGART, S., FREY, C., ZIEGLER, D., KOHLER, E., MAZIÈRES, D., KAASHOEK, F., AND MORRIS, R. Labels and event processes in the Asbestos operating system. In Proc. SOSP (2005).
-
(2005)
Proc. SOSP
-
-
Efstathopoulos, P.1
Krohn, M.2
Vandebogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
10
-
-
0036036098
-
Extended static checking for Java
-
FLANAGAN, C., LEINO, K. R. M., LILLIBRIDGE, M., NELSON, G., SAXE, J. B., AND STATA, R. Extended static checking for Java. In Proc. PLDI (2002).
-
(2002)
Proc. PLDI
-
-
Flanagan, C.1
Leino, K.R.M.2
Lillibridge, M.3
Nelson, G.4
Saxe, J.B.5
Stata, R.6
-
11
-
-
77952407110
-
Amnesia: Analysis and monitoring for neutralizing SQL-injection attacks
-
HALFOND, W. G. J., AND ORSO, A. AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks. In Proc. ASE (2005).
-
(2005)
Proc. ASE
-
-
Halfond, W.G.J.1
Orso, A.2
-
12
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
HUANG, Y.-W., YU, F., HANG, C., TSAI, C.-H., LEE, D.T., AND KUO, S.-Y. Securing web application code by static analysis and runtime protection. In Proc. WWW'04 (2004).
-
(2004)
Proc. WWW'04
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.T.5
Kuo, S.-Y.6
-
13
-
-
57749192483
-
Information flow control for standard OS abstractions
-
KROHN, M., YIP, A., BRODSKY, M., CLIFFER, N., KAASHOEK, M. F., KOHLER, E., AND MORRIS, R. Information flow control for standard OS abstractions. In Proc. SOSP (2007).
-
(2007)
Proc. SOSP
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
14
-
-
28144453801
-
Practical information-flow control in web-based information systems
-
LI, P., AND ZDANCEWIC, S. Practical information-flow control in web-based information systems. In Proc. CSFW (2005).
-
(2005)
Proc. CSFW
-
-
Li, P.1
Zdancewic, S.2
-
15
-
-
0001851744
-
JFlow: Practical mostly-static information flow control
-
MYERS, A. C. JFlow: Practical mostly-static information flow control. In Proc. POPL (1999).
-
(1999)
Proc. POPL
-
-
Myers, A.C.1
-
16
-
-
0005260169
-
-
July Software release at
-
MYERS, A. C., ZHENG, L., ZDANCEWIC, S., CHONG, S., AND NYSTROM, N. Jif: Java information flow, July 2001. Software release at http://www.cs.cornell.edu/jif.
-
(2001)
Jif: Java Information Flow
-
-
Myers, A.C.1
Zheng, L.2
Zdancewic, S.3
Chong, S.4
Nystrom, N.5
-
17
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
NGUYEN-TUONG, A., GUARNIERI, S., GREENE, D., SHIRLEY, J., AND EVANS, D. Automatically hardening web applications using precise tainting. In Proc. IFIP International Information Security Conference (2005).
-
(2005)
Proc. IFIP International Information Security Conference
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
18
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
RIZVI, S., MENDELZON, A., SUDARSHAN, S., AND ROY, P. Extending query rewriting techniques for fine-grained access control. In Proc. SIGMOD (2004).
-
(2004)
Proc. SIGMOD
-
-
Rizvi, S.1
Mendelzon, A.2
Sudarshan, S.3
Roy, P.4
-
21
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
XIE, Y., AND AIKEN, A. Static detection of security vulnerabilities in scripting languages. In Proc. USENIX Security (2006).
-
(2006)
Proc. USENIX Security
-
-
Xie, Y.1
Aiken, A.2
-
22
-
-
72249104474
-
Improving application security with data flow assertions
-
YIP, A., WANG, X., ZELDOVICH, N., AND KAASHOEK, M. F. Improving application security with data flow assertions. In Proc. SOSP (2009).
-
(2009)
Proc. SOSP
-
-
Yip, A.1
Wang, X.2
Zeldovich, N.3
Kaashoek, M.F.4
-
23
-
-
84888352157
-
Making information flow explicit in HiStar
-
ZELDOVICH, N., BOYD-WICKIZER, S., KOHLER, E., AND MAZIÈRES, D. Making information flow explicit in HiStar. In Proc. OSDI (2006).
-
(2006)
Proc. OSDI
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
|