Enhancing Privacy Implementations of Database Enquiries
暂无分享,去创建一个
[1] Andreas Pfitzmann,et al. Properties of protection goals and their integration into a user interface , 2000, Comput. Networks.
[2] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[3] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[4] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[5] Matthew Hennessy,et al. The security pi-calculus and non-interference , 2005, J. Log. Algebraic Methods Program..
[6] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[7] John C. Mitchell,et al. Enterprise privacy promises and enforcement , 2005, WITS '05.
[8] Application Security of Erlang Concurrent System , 2008 .
[9] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[10] Florian Kammüller,et al. Formalizing non-interference for a simple bytecode language in Coq , 2008, Formal Aspects of Computing.
[11] L. Henrio,et al. ASPfun: A Functional and Distributed Object Calculus Semantics, Type-system, and Formalization , 2007 .
[12] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[13] Lawrence Charles Paulson,et al. ML for the working programmer , 1991 .
[14] Joe Armstrong,et al. Programming Erlang: Software for a Concurrent World , 1993 .
[15] Chanchal Kumar Roy,et al. Modeling Erlang in the pi-calculus , 2005, ERLANG '05.