Secure Information Flow as a Safety Problem
暂无分享,去创建一个
[1] Rajeev Alur,et al. A Temporal Logic of Nested Calls and Returns , 2004, TACAS.
[2] Andrew C. Myers,et al. Robust declassification , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[3] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[4] Donald Sanella. What Does the Future Hold for Theoretical Computer Science , 1997 .
[5] Torben Amtoft,et al. Information Flow Analysis in Logical Form , 2004, SAS.
[6] Andreas Podelski,et al. Transition predicate abstraction and fair termination , 2005, POPL '05.
[7] Sriram K. Rajamani,et al. The SLAM project: debugging system software via static analysis , 2002, POPL '02.
[8] John McLean,et al. A general theory of composition for trace sets closed under selective interleaving functions , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Thomas A. Henzinger,et al. Lazy abstraction , 2002, POPL '02.
[10] Andrew C. Myers,et al. A Model for Delimited Information Release , 2003, ISSS.
[11] Geoffrey Smith,et al. A Type-Based Approach to Program Security , 1997, TAPSOFT.
[12] Reiner Hähnle,et al. A Theorem Proving Approach to Analysis of Secure Information Flow , 2005, SPC.
[13] Akinori Yonezawa,et al. Software Security — Theories and Systems , 2003, Lecture Notes in Computer Science.
[14] Roberto Giacobazzi,et al. Abstract non-interference: parameterizing non-interference by abstract interpretation , 2004, POPL.
[15] Peng Li,et al. Downgrading policies and relaxed noninterference , 2005, POPL '05.
[16] Andreas Podelski,et al. Relative Completeness of Abstraction Refinement for Software Model Checking , 2002, TACAS.