Catch me if you can: permissive yet secure error handling
暂无分享,去创建一个
[1] John G. P. Barnes,et al. High Integrity Software - The SPARK Approach to Safety and Security , 2003 .
[2] David Sands,et al. Termination-Insensitive Noninterference Leaks More Than Just a Bit , 2008, ESORICS.
[3] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[4] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[5] Vincent Simonet. Fine-grained information flow analysis for a /spl lambda/-calculus with sum types , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[6] François Pottier,et al. Information flow inference for ML , 2003, TOPL.
[7] Michael R. Clarkson,et al. Belief in information flow , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).
[8] Boniface Hicks,et al. Jifclipse: development tools for security-typed languages , 2007, PLAS '07.
[9] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[10] Andrew C. Myers,et al. Parameterized types for Java , 1997, POPL '97.
[11] Trent Jaeger,et al. Implicit Flows: Can't Live with 'Em, Can't Live without 'Em , 2008, ICISS.
[12] Adrian Hilton,et al. Enforcing security and safety models with an information flow analysis tool , 2004 .
[13] Boniface Hicks,et al. From Languages to Systems: Understanding Practical Application Development in Security-typed Languages , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[14] Geoffrey Smith,et al. Eliminating covert flows with minimum typings , 1997, Proceedings 10th Computer Security Foundations Workshop.
[15] David Sands,et al. Noninterference in the presence of non-opaque pointers , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[16] Michael R. Clarkson,et al. Civitas: Toward a Secure Voting System , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[17] H. Stamer. Security-Typed Languages for Implementation of Cryptographic Protocols : A Case Study , 2007 .
[18] Craig Schaffert,et al. CLU Reference Manual , 1984, Lecture Notes in Computer Science.
[19] David Clark,et al. Quantitative Analysis of the Leakage of Confidential Data , 2002, QAPL.
[20] David Clark,et al. Quantified Interference for a While Language , 2005, QAPL.
[21] Gilles Barthe,et al. Non-interference for a JVM-like language , 2005, TLDI '05.
[22] Gilles Barthe,et al. Deriving an information flow checker and certifying compiler for Java , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[23] Michael R. Clarkson,et al. Polyglot: An Extensible Compiler Framework for Java , 2003, CC.
[24] Gilles Barthe,et al. A Certified Lightweight Non-interference Java Bytecode Verifier , 2007, ESOP.
[25] Geoffrey Smith,et al. Lenient array operations for practical secure information flow , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[26] Andrew C. Myers,et al. Jif: java information flow , 1999 .
[27] Vincent Simonet. The Flow Caml system , 2003 .
[28] David Sands,et al. All Secrets Great and Small , 2009, ESOP.
[29] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..