Verified Enforcement of Security Policies for Cross-Domain Information Flows
暂无分享,去创建一个
[1] Ninghui Li,et al. Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[2] James Cheney,et al. Provenance management in curated databases , 2006, SIGMOD Conference.
[3] Michael Hicks,et al. Fable: A Language for Enforcing User-defined Security Policies , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[4] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[5] Michael Hicks,et al. Managing policy updates in security-typed languages , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[6] N. Swamy,et al. Toward Specifying and Validating Cross-Domain Policies , 2007 .
[7] Access control in a core calculus of dependency , 2006, ICFP '06.
[8] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..