Termination-Insensitive Noninterference Leaks More Than Just a Bit
暂无分享,去创建一个
[1] Jeffrey S. Fenton. Memoryless Subsystems , 1974, Comput. J..
[2] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[3] Marieke Huisman,et al. A temporal logic characterisation of observational determinism , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[4] Geoffrey Smith,et al. Adversaries and Information Leaks (Tutorial) , 2007, TGC.
[5] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[6] John G. P. Barnes,et al. High Integrity Software - The SPARK Approach to Safety and Security , 2003 .
[7] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[8] David Sands,et al. A Per Model of Secure Information Flow in Sequential Programs , 1999, High. Order Symb. Comput..
[9] Geoffrey Smith,et al. Eliminating covert flows with minimum typings , 1997, Proceedings 10th Computer Security Foundations Workshop.
[10] Andrei Sabelfeld,et al. Gradual Release: Unifying Declassification, Encryption and Key Release Policies , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[11] David A. Schmidt,et al. Automata-Based Confidentiality Monitoring , 2006, ASIAN.
[12] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[13] Brian Campbell,et al. Amortised Memory Analysis Using the Depth of Data Structures , 2009, ESOP.
[14] Andrei Sabelfeld,et al. Cryptographically-masked flows , 2006, Theor. Comput. Sci..
[15] Geoffrey Smith,et al. Fast probabilistic simulation, nontermination, and secure information flow , 2007, PLAS '07.
[16] Adrian Hilton,et al. Enforcing security and safety models with an information flow analysis tool , 2004, SIGAda '04.
[17] Andrei Sabelfeld,et al. Tight Enforcement of Information-Release Policies for Dynamic Languages , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[18] K. Rustan M. Leino,et al. A semantic approach to secure information flow , 2000, Sci. Comput. Program..
[19] Anindya Banerjee,et al. Expressive Declassification Policies and Modular Static Enforcement , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).