Static enforcement of security with types
暂无分享,去创建一个
[1] David Walker,et al. Typed memory management in a calculus of capabilities , 1999, POPL '99.
[2] Scott F. Smith,et al. Type inference for recursively constrained types and its application to OOP , 1995, MFPS.
[3] Xavier Leroy,et al. Security properties of typed applets , 1998, POPL '98.
[4] Hemma Prafullchandra,et al. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2 , 1997, USENIX Symposium on Internet Technologies and Systems.
[5] Yiannis N. Moschovakis,et al. Recursion in Higher Types , 1977 .
[6] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[7] George C. Necula,et al. Safe kernel extensions without run-time checking , 1996, OSDI '96.
[8] Alexander Aiken,et al. Type inclusion constraints and type inference , 1993, FPCA '93.
[9] David Walker,et al. A type system for expressive security policies , 2000, POPL '00.
[10] David A. Bell,et al. Secure computer systems: mathematical foundations and model , 1973 .
[11] Luo Hong. JAVA Security Architecture , 2000 .
[12] Jon G. Riecke,et al. The SLam calculus: programming with secrecy and integrity , 1998, POPL '98.
[13] Dan S. Wallach,et al. A new approach to mobile code security , 1999 .
[14] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.