A Logic for Information Flow Analysis of Distributed Programs
暂无分享,去创建一个
[1] Mads Dam,et al. ENCoVer: Symbolic Exploration for Information Flow Security , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[2] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[3] Andrei Sabelfeld,et al. Tight Enforcement of Information-Release Policies for Dynamic Languages , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[4] Andrew C. Myers,et al. Attacker Control and Impact for Confidentiality and Integrity , 2011, Log. Methods Comput. Sci..
[5] Kousha Etessami,et al. Analysis of Recursive Game Graphs Using Data Flow Equations , 2004, VMCAI.
[6] Michael R. Clarkson,et al. Information-flow security for interactive programs , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[7] Stephen Chong,et al. Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[8] Ronald Fagin,et al. Reasoning about knowledge , 1995 .
[9] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[10] Paul Walton,et al. A Model for Information , 2014, Inf..
[11] J. Todd Wittbold,et al. Information flow in nondeterministic systems , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[12] Mads Dam,et al. Epistemic temporal logic for information flow security , 2011, PLAS '11.
[13] Joshua D. Guttman,et al. What Needs Securing , 1988, CSFW.
[14] Heiko Mantel,et al. Static Confidentiality Enforcement for Distributed Programs , 2002 .
[15] Alastair F. Donaldson,et al. Software Model Checking , 2014, Computing Handbook, 3rd ed..
[16] Bernd Finkbeiner,et al. Model Checking Information Flow in Reactive Systems , 2012, VMCAI.
[17] John McLean,et al. A general theory of composition for trace sets closed under selective interleaving functions , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[18] Swarat Chaudhuri,et al. Model Checking on Trees with Path Equivalences , 2007, TACAS.
[19] Heiko Mantel,et al. Securing Communication in a Concurrent Language , 2002, SAS.
[20] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[21] Andrei Sabelfeld,et al. Gradual Release: Unifying Declassification, Encryption and Key Release Policies , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[22] John McLean,et al. Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[23] Joseph Y. Halpern,et al. Secrecy in Multiagent Systems , 2008, TSEC.
[24] Rajeev Alur,et al. A Temporal Logic of Nested Calls and Returns , 2004, TACAS.
[25] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[26] Corina S. Pasareanu,et al. Symbolic PathFinder: symbolic execution of Java bytecode , 2010, ASE.
[27] David Sands,et al. Declassification: Dimensions and principles , 2009, J. Comput. Secur..