Complete, safe information flow with decentralized labels
暂无分享,去创建一个
[1] Jens Palsberg,et al. Trust in the λ-calculus , 1995, Journal of Functional Programming.
[2] Jerome H. Saltzer,et al. Protection and the control of information sharing in multics , 1974, CACM.
[3] Geoffrey Smith,et al. Secure information flow in a multi-threaded imperative language , 1998, POPL '98.
[4] Simon N. Foley. A taxonomy for information flow policies and models , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Martín Abadi,et al. Secrecy by Typing inSecurity Protocols , 1997, TACS.
[6] Andrew C. Myers,et al. A decentralized model for information flow control , 1997, SOSP.
[7] Daniel Jackson,et al. Elements of style: analyzing a software design feature with a counterexample detector , 1996, ISSTA '96.
[8] Jon G. Riecke,et al. The SLam calculus: programming with secrecy and integrity , 1998, POPL '98.
[9] Luis-Felipe Cabrera,et al. CACL: efficient fine-grained protection for objects , 1992, OOPSLA.
[10] Dennis M. Volpano,et al. Provably-secure programming languages for remote evaluation , 1997, SIGP.
[11] J DenningPeter,et al. Certification of programs for secure information flow , 1977 .
[12] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[13] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[14] LouAnna Notargiacomo,et al. Beyond the pale of MAC and DAC-defining new forms of access control , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[15] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[16] Martín Abadi,et al. Secrecy by typing in security protocols , 1999, JACM.
[17] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[18] Elisa Bertino,et al. Providing flexibility in information flow control for object oriented systems , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[19] Barbara Liskov,et al. A language extension for expressing constraints on data access , 1978, CACM.
[20] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[21] Gregory R. Andrews,et al. An Axiomatic Approach to Information Flow in Programs , 1980, TOPL.
[22] James A. Reeds,et al. Multilevel security in the UNIX tradition , 1992, Softw. Pract. Exp..
[23] H SaltzerJerome. Protection and the control of information sharing in multics , 1973 .
[24] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.