Automated enforcement for relaxed information release with reference points
暂无分享,去创建一个
Zhong Chen | Jianfeng Ma | Ning Xi | Cong Sun | Sheng Gao
[1] Zhong Chen,et al. Secure Information Flow in Java via Reachability Analysis of Pushdown System , 2010, 2010 10th International Conference on Quality Software.
[2] Somesh Jha,et al. Weighted pushdown systems and their application to interprocedural dataflow analysis , 2005, Sci. Comput. Program..
[3] David A. Naumann. From Coupling Relations to Mated Invariants for Checking Information Flow , 2006, ESORICS.
[4] James Cheney,et al. Notions of Bidirectional Computation and Entangled State Monads , 2015, MPC.
[5] Alexander Aiken,et al. Secure Information Flow as a Safety Problem , 2005, SAS.
[6] Steve Zdancewic,et al. Challenges for Information-flow Security , 2004 .
[7] Qing Si. Design of secure operating systems with high security levels , 2007 .
[8] Heiko Mantel,et al. Scheduler-Independent Declassification , 2012, MPC.
[9] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[10] Qing Si-han,et al. Design of secure operating systems with high security levels , 2007 .
[11] Atta Badii,et al. A Policy Model for Secure Information Flow , 2009, ARSPA-WITS.
[12] Gavin Lowe,et al. Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security , 2010, Lecture Notes in Computer Science.
[13] Rocco De Nicola,et al. Proceedings of the 16th European Symposium on Programming , 2007 .
[14] Zhong Chen,et al. A Multi-compositional Enforcement on Information Flow Security , 2011, ICICS.
[15] Somesh Jha,et al. Weighted pushdown systems and their application to interprocedural dataflow analysis , 2003, Sci. Comput. Program..
[16] Zhong Chen,et al. Secure Information Flow by Model Checking Pushdown System , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.
[17] Peng Li,et al. Downgrading policies and relaxed noninterference , 2005, POPL '05.
[18] Li Guo,et al. A novel logic-based automatic approach to constructing compliant security policies , 2011, Science China Information Sciences.
[19] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[20] Song Chen,et al. Symbolic algorithmic verification of intransitive generalized noninterference , 2011, Science China Information Sciences.
[21] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[22] Jianying Zhou,et al. Information and Communications Security , 2013, Lecture Notes in Computer Science.
[23] Andrew C. Myers,et al. A Model for Delimited Information Release , 2003, ISSS.
[24] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[25] David Sands,et al. Declassification: Dimensions and principles , 2009, J. Comput. Secur..
[26] Heiko Mantel,et al. Declassification with Explicit Reference Points , 2009, ESORICS.
[27] Zhong Chen,et al. A new enforcement on declassification with reachability analysis , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[28] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[29] Heiko Mantel,et al. Controlling the What and Where of Declassification in Language-Based Security , 2007, ESOP.
[30] Stefan Schwoon,et al. Model checking pushdown systems , 2002 .
[31] Heiko Mantel,et al. Who Can Declassify? , 2008, Formal Aspects in Security and Trust.
[32] Andrei Sabelfeld,et al. Localized delimited release: combining the what and where dimensions of information release , 2007, PLAS '07.
[33] Andrew C. Myers,et al. A decentralized model for information flow control , 1997, SOSP.
[34] J DenningPeter,et al. Certification of programs for secure information flow , 1977 .
[35] Pedro R. D'Argenio,et al. Secure information flow by self-composition , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..